BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Breaking Card: Reverse-Engineering the Smart-Card Application Prot
 ocol Data Unit - Andriana E. Gkaniatsou\, Edinburgh University
DTSTART:20151113T160000Z
DTEND:20151113T164500Z
UID:TALK61560@talks.cam.ac.uk
CONTACT:Markus Kuhn
DESCRIPTION:Smart-Cards are considered as one of the most secure\, trusted
  and tamper-resistant devices for performing cryptographic operations. The
  commonly used RSA PKCS#11 standard defines the API for cryptographic hard
 ware such as smart-cards. Though there has been work on formally verifying
  the correctness of the implementation of PKCS#11 in the API level\, littl
 e or none attention has been paid on the low-level protocols that are clos
 ely connected to it.\nWe will present REPROVE an automated tool that rever
 se-engineers the low-level communication between a smart-card and a reader
 \, deduces the card's functionalities and maps that communication to PKCS#
 11 functions. REPROVE is implementation practice independent and does not 
 require access to the card nor to its API.\n
LOCATION:Computer Laboratory\, William Gates Building\, Room FW11
END:VEVENT
END:VCALENDAR
