DOI: 10.29007/c4xk
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA

Abstract: In this paper, we perform an automated analysis of two devices developed by Yubico: YubiKey, designed to authenticate a user to network-based services, and YubiHSM, Yubico's hardware security module. Both are analyzed using the Maude-NPA cryptographic protocol analyzer. Although previous work has been done applying automated tools to these devices, to the best of our knowledge there has been no completely automated analysis to date. This is not surprising, because both YubiKey and YubiHSM, which make use of cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The Maude-NPA protocol analyzer has already been tested with various protocols using associative operators without encountering any incompleteness warnings (see[68]). 17 The iter, or iterated operator, theory is a built-in mechanism that allows the efficient input, output, and manipulation of very large stacks of a unary operator, see[24].…”
mentioning
confidence: 99%
“…The Maude-NPA protocol analyzer has already been tested with various protocols using associative operators without encountering any incompleteness warnings (see[68]). 17 The iter, or iterated operator, theory is a built-in mechanism that allows the efficient input, output, and manipulation of very large stacks of a unary operator, see[24].…”
mentioning
confidence: 99%
“…In summary, nothing has changed for properties (b) and (c), and property (e) can now be carried out by Tamarin using a lemma. However, our automated analysis [63] was done before [45] appeared.…”
Section: Experiments Using Tamarinmentioning
confidence: 99%
“…We checked that the latest version of Tamarin was able to find the corresponding attack of the new specification of propery (e), though our automated analysis in Maude-NPA was done [63] before [45] appeared.…”
Section: Experiments Using Tamarinmentioning
confidence: 99%