Formal Analysis of Security APIs
نویسنده
چکیده
An Application Program Interface (API) is considered a security API when it is designed not only to offer access to functionality but also to enforce a security policy, i.e. no matter what commands are sent to the interface, some security properties continue to hold. They are used, for example, as interfaces to cryptographic hardware modules and smartcards. They are very difficult to design, and errors in security APIs have been shown to give rise to critical vulnerabilities in a variety of real world systems, from cash machine PIN processing modules to authentication tokens. Formal analysis of security APIs aims to use techniques from program verification both to find attacks on faulty APIs, and prove security properties of correct ones. This thesis describes some of my work on developing this area from 2004-2010. We focus on APIs for cryptographic key management. We start by defining a Dolev-Yao like model for security APIs, which leads in general to an undecidable security problem. We show decidability for a number of subclasses and soundness for some abstractions. We show how these results have been applied to real commercially available devices, resulting in the unearthing of a number of previously unknown vulnerabilities. We propose a new API for key management which we prove secure in our model. Finally we evaluate the work and give some perspectives.
منابع مشابه
Final Report of Grant GR/S98139/01: Automated Analysis of Security Critical Systems
The aim of the project was to investigate the application of security protocol analysis techniques to security APIs. Security protocols are short programs that describe the secure exchange of information over an insecure network, using cryptography. Security APIs are the Application Program Interfaces of tamper-resistant hardware security modules, commonly used in security critical applications...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملSecurity Analysis of Parlay/OSA Framework
This paper analyzes the security of the Trust and Security Management (TSM) protocol, an authentication protocol which is part of the Parlay/OSA Application Program Interfaces (APIs). Architectures based on Parlay/OSA APIs allow third party service providers to develop new services that can access, in a controlled and secure way, to those network capabilities offered by the network operator. Ro...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملSecurity API analysis with the spi-calculus
API level vulnerabilities of hardware security modules represent a serious threat, thus, discovering and patching security holes in APIs are important. In this paper, we argue and illustrate that the application of formal verification methods is a promising approach for API analysis. In particular, we propose an API verification method based on process algebra. The proposed method seems to be e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011