This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Analysis of a hardware security module's high-availability setting
May-June 2013 (vol. 11 no. 3)
pp. 77-80
Benedikt Koppel, ETH Zurich
Stephan Neuhaus, ETH Zurich
Analysis of a hardware security module (HSM) revealed two flaws that could lead to security problems. The first involved key deletion; the second involved unauthorized members of a group of HSMs. Neither flaw is probably fatal, if organizations develop organizational ways to work around it. However, for organizations to apply the solutions, they must be aware of the flaws.
Index Terms:
separation of duties,systems security,hardware security module,HSM,cryptography,high availability
Citation:
Benedikt Koppel, Stephan Neuhaus, "Analysis of a hardware security module's high-availability setting," IEEE Security & Privacy, vol. 11, no. 3, pp. 77-80, May-June 2013, doi:10.1109/MSP.2013.56
Usage of this product signifies your acceptance of the Terms of Use.