2009
DOI: 10.1007/978-3-642-04444-1_4
|View full text |Cite
|
Sign up to set email alerts
|

Type-Based Analysis of PIN Processing APIs

Abstract: Abstract. We examine some known attacks on the PIN verification framework, based on weaknesses of the security API for the tamperresistant Hardware Security Modules used in the network. We specify this API in an imperative language with cryptographic primitives, and show how its flaws are captured by a notion of robustness that extends the one of Myers, Sabelfeld and Zdancewic to our cryptographic setting. We propose an improved API, give an extended type system for assuring integrity and for preserving confid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 19 publications
(25 citation statements)
references
References 23 publications
0
25
0
Order By: Relevance
“…In a recent work [5], we prove integrity of low-integrity data using Message Authentication Codes (MACs). The secrecy of the MAC key ensures the integrity of the exchanged data: once the MAC is recomputed and checked, we are guaranteed that no one has manipulated the received data.…”
Section: Proving Integrity By Equalitymentioning
confidence: 99%
See 3 more Smart Citations
“…In a recent work [5], we prove integrity of low-integrity data using Message Authentication Codes (MACs). The secrecy of the MAC key ensures the integrity of the exchanged data: once the MAC is recomputed and checked, we are guaranteed that no one has manipulated the received data.…”
Section: Proving Integrity By Equalitymentioning
confidence: 99%
“…The same idea has recently been applied in the information flow security [7,8] to prove that randomized cyphertexts could be leaked without breaking noninterference. Deterministic encryption has been modeled in a symbolic setting for information flow by Centenaro, Focardi, Luccio and Steel [5] extending the idea of pattern. That work anyway does not account for hash functions.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The attack goes on using another public parameter, the offset, to reconstruct the whole PIN code. The interested reader is referred to, e.g., [8,9,12,20], for more detail.…”
Section: Introductionmentioning
confidence: 99%