Attacking and Fixing PKCS#11 Security Tokens

被引:39
作者
Bortolozzo, Matteo [1 ]
Centenaro, Matteo [1 ]
Focardi, Riccardo [1 ]
Steel, Graham [2 ,3 ,4 ]
机构
[1] Univ Ca Foscari, Venice, Italy
[2] INRIA, LSV, Cachan, France
[3] CNRS, Cachan, France
[4] ENS Cachan, Cachan, France
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Security APIs; key management; PKCS#11; model checking; KEY MANAGEMENT;
D O I
10.1145/1866307.1866337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show how to extract sensitive cryptographic keys from a variety of commercially available tamper resistant cryptographic security tokens, exploiting vulnerabilities in their RSA PKCS#11 based APIs. The attacks are performed by Tookan, an automated tool we have developed, which reverse-engineers the particular token in use to deduce its functionality, constructs a model of its API for a model checker, and then executes any attack trace found by the model checker directly on the token. We describe the operation of Tookan and give results of testing the tool on 17 commercially available tokens: 9 were vulnerable to attack, while the other 8 had severely restricted functionality. One of the attacks found by the model checker has not previously appeared in the literature. We show how Tookan may be used to verify patches to insecure devices, and give a secure configuration that we have implemented in a patch to a software token simulator. This is the first such configuration to appear in the literature that does not require any new cryptographic mechanisms to be added to the standard. We comment on lessons for future key management APIs.
引用
收藏
页码:260 / 269
页数:10
相关论文
共 13 条
[1]   SAT-based model-checking for security protocols analysis [J].
Armando, Alessandro ;
Compagna, Luca .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (01) :3-32
[2]  
Baloci L., 2010, THESIS
[3]  
Bond M., 2001, LNCS, V2162, P220
[4]   A Secure Cryptographic Token Interface [J].
Cachin, Christian ;
Chandran, Nishanth .
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, :141-+
[5]  
Clayton R, 2002, LECT NOTES COMPUT SC, V2523, P579
[6]  
Clulow J., 2003, 5 INT WORKSH CRYPT H, P411
[7]  
Cortier V, 2009, LECT NOTES COMPUT SC, V5789, P605, DOI 10.1007/978-3-642-04444-1_37
[8]  
DELAUNE S, 2009, J COMPUTER IN PRESS
[9]   Formal analysis of PKCS#11 [J].
Delaune, Stephanie ;
Kremer, Steve ;
Steel, Graham .
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS, 2008, :331-+
[10]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208