A Formally Verified Configuration for Hardware Security Modules in the Cloud

09/28/2021
by   Riccardo Focardi, et al.
0

Hardware Security Modules (HSMs) are trusted machines that perform sensitive operations in critical ecosystems. They are usually required by law in financial and government digital services. The most important feature of an HSM is its ability to store sensitive credentials and cryptographic keys inside a tamper-resistant hardware, so that every operation is done internally through a suitable API, and such sensitive data are never exposed outside the device. HSMs are now conveniently provided in the cloud, meaning that the physical machines are remotely hosted by some provider and customers can access them through a standard API. The property of keeping sensitive data inside the device is even more important in this setting as a vulnerable application might expose the full API to an attacker. Unfortunately, in the last 20+ years a multitude of practical API-level attacks have been found and proved feasible in real devices. The latest version of PKCS#11, the most popular standard API for HSMs, does not address these issues leaving all the flaws possible. In this paper, we propose the first secure HSM configuration that does not require any restriction or modification of the PKCS#11 API and is suitable to cloud HSM solutions, where compliance to the standard API is of paramount importance. The configuration relies on a careful separation of roles among the different HSM users so that known API flaws are not exploitable by any attacker taking control of the application. We prove the correctness of the configuration by providing a formal model in the state-of-the-art Tamarin prover and we show how to implement the configuration in a real cloud HSM solution.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/17/2019

Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

With the advancements in the enterprise-level business development, the ...
research
06/02/2021

Phoenix: A Formally Verified Regenerating Vault

An attacker that gains access to a cryptocurrency user's private keys ca...
research
03/28/2020

Security Analysis of the Open Banking Account and Transaction API Protocol

To counteract the lack of competition and innovation in the financial se...
research
01/31/2019

An Extensive Formal Security Analysis of the OpenID Financial-grade API

Forced by regulations and industry demand, banks worldwide are working t...
research
02/27/2023

Formal Analysis of the API Proxy Problem

Implementing a security mechanism on top of APIs requires clear understa...
research
04/28/2023

faulTPM: Exposing AMD fTPMs' Deepest Secrets

Trusted Platform Modules constitute an integral building block of modern...
research
02/25/2019

Fractal: Automated Application Scaling

To date, cloud applications have used datacenter resources through manua...

Please sign up or login with your details

Forgot password? Click here to reset