Concepts and proofs for configuring PKCS#11

  • Authors:
  • Sibylle Fröschle;Nils Sommer

  • Affiliations:
  • Department of Informatics, University of Oldenburg, Germany;MWR InfoSecurity, Basingstoke, UK

  • Venue:
  • FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We have recently put forward several ideas of how to specify, model, and verify security APIs centered around the slogan ‘security APIs are also like programs' and first-order linear time logic extended by past operators. We have developed these ideas based on an investigation of PKCS #11, a standard widely adopted in industry, and presented preliminary results at FAST'10. In this paper, we present several novel results about PKCS #11 that we have obtained based on the full implementation of this approach. In particular, this concerns an analysis of the ‘wrap with trusted feature', a full analysis of which has been out of reach for the previous models. At the same time we provide concepts and terminology that connect to Bond and Clulow's ‘Types of Intention' and devise an informal method of configuring and understanding PKCS #11.