Abstract
Chris Mitchell: From your paper I got the impression you were implying there was only one API, I think actually different banks use different HSMs, with different APIs.
Reply: Yes, I’m going to talk about one API that we looked at, the API produced by IBM, and some of the issues we found with that. We have found issues also with an API from another manufacturer, Thales, and we’ve got a much larger paper, which is really rather long and tedious, describing all the different APIs we have looked at, the APIs we don’t know about, and what we suspect are the cases with those, and I think there’s a link to that towards the end.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bond, M. (2009). Phish and Chips. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2006. Lecture Notes in Computer Science, vol 5087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04904-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-04904-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04903-3
Online ISBN: 978-3-642-04904-0
eBook Packages: Computer ScienceComputer Science (R0)