ASA-4 Accepted Papers

Construction of a Trusted Virtual Security Module
Hidden Semantics: why? how? and what to do?
Connecting the Dot-Dots: Model Checking Concurrency in a Security API
Abstractions for Verifying Key Management APIs
When is a PKCS#11 configuration secure?
CryptokiX: a cryptographic software token with security fixes
Verifying Authentication Properties of C Security Protocol Code Using General Verifiers