Security APIs at FOSAD school

I ve just given a course at the FOSAD’10 school, reviewing practical attacks on security APIs and illustrating formal techniques to detect and fix them. The first part of the course focusses on PIN cracking attacks on Hardware Security Modules (HSMs) used by ATM networks to protect user PINs. The second part focusses on PKCS#11 tokens. I have described Tookan, a tool that reverse engineers real cryptographic tokens and performs a formal analysis of the resulting model, finding possible attacks and testing them on the real device (hope to have soon a trial version on this site). I have finally¬† illustrated CryptokiX, our security-enhanced software simulator of a PKCS#11 token. Here are the slides [Part I]¬†[Part II]

Author: riccardo

I am Associate Professor in Computer Science at the University Ca' Foscari of Venice. My main research interest is computer and network security, from foundations to practical aspects. I coordinate the secgroup@cafoscari.

Leave a Reply

Your email address will not be published. Required fields are marked *