International Journal of Computer Application and Engineering Technology (IJCAET)
Application Programming Interfaces (APIs) used by security processors are prone to many vulnerable attacks. These attacks also lead to many other similar attacks which are familiar on authentication protocols. The main idea behind this is that it is quite possible to derive results that break the security rules made by its designer by giving correct commands to the security processor in an unexpected order. These types of attacks are economically important since security processors are used to perform a number of services, from ATM through prepayment utility metering to pay-TV.