Susceptible Attacks on API and Their Security Designs

Download Now
Provided by: International Journal of Computer Application and Engineering Technology (IJCAET)
Topic: Security
Format: PDF
Application Programming Interfaces (APIs) used by security processors are prone to many vulnerable attacks. These attacks also lead to many other similar attacks which are familiar on authentication protocols. The main idea behind this is that it is quite possible to derive results that break the security rules made by its designer by giving correct commands to the security processor in an unexpected order. These types of attacks are economically important since security processors are used to perform a number of services, from ATM through prepayment utility metering to pay-TV.
Download Now

Find By Topic