M. Abadi and V. Cortier, Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, vol.387, issue.12, pp.2-32, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00000554

M. Abadi and C. Fournet, Mobile values, new names, and secure communication, Proc. 28th ACM Symp. on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

M. Arapinis, E. Ritter, and M. Ryan, Statverif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11), pp.33-47, 2011.

A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Proc. 17th International Conference on Computer Aided Verification (CAV'05), pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Abad, Formal analysis of SAML 2.0 web browser single sign-on, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.1-10, 2008.
DOI : 10.1145/1456396.1456397

S. Bistarelli, I. Cervesato, G. Lenzini, and F. Martinelli, Relating multiset rewriting and process algebras for security protocol analysis, Journal of Computer Security, vol.13, issue.1, pp.3-47, 2005.
DOI : 10.3233/JCS-2005-13102

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.82-96, 2001.
DOI : 10.1109/CSFW.2001.930138

B. Blanchet, B. Smyth, and V. Cheval, ProVerif 1.88: Automatic Cryptographic Protocol Verifier, 2013.

M. Bond and R. Anderson, API-level attacks on embedded systems, Computer, vol.34, issue.10, pp.67-75, 2001.
DOI : 10.1109/2.955101

M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel, Attacking and fixing PKCS#11 security tokens, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.260-269, 2010.
DOI : 10.1145/1866307.1866337

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state
URL : https://hal.archives-ouvertes.fr/hal-01351388

S. Delaune, S. Kremer, and G. Steel, Formal security analysis of PKCS#11 and proprietary extensions, Journal of Computer Security, vol.18, issue.6, pp.1211-1245, 2010.
DOI : 10.3233/JCS-2009-0394

S. Delaune, S. Kremer, M. D. Ryan, and G. Steel, Formal Analysis of Protocols Based on TPM State Registers, 2011 IEEE 24th Computer Security Foundations Symposium, pp.66-82, 2011.
DOI : 10.1109/CSF.2011.12

URL : https://hal.archives-ouvertes.fr/inria-00636747

S. Escobar, C. Meadows, and J. Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Foundations of Security Analysis and Design V, pp.1-50, 2009.
DOI : 10.1007/s10990-007-9000-6

S. B. Fröschle and N. Sommer, Reasoning with Past to Prove PKCS#11 Keys Secure, Proc. 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), pp.96-110, 2010.
DOI : 10.1007/978-3-642-03459-6_7

J. A. Garay, M. Jakobsson, and P. D. Mackenzie, Abuse-Free Optimistic Contract Signing, Advances in Cryptology?Crypto'99, pp.449-466, 1999.
DOI : 10.1007/3-540-48405-1_29

J. D. Guttman, State and Progress in Strand Spaces: Proving Fair Exchange, Journal of Automated Reasoning, vol.14, issue.5, pp.159-195, 2012.
DOI : 10.1007/s10817-010-9202-1

J. Herzog, Applying protocol analysis to security device interfaces, IEEE Security & Privacy Magazine, vol.4, issue.4, pp.84-87, 2006.
DOI : 10.1109/MSP.2006.85

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Proc. 35th IEEE Symposium on Security and Privacy (S&P'14), pp.163-178, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01351388

R. Künnemann, Automated backward analysis of PKCS#11 v2, Proc. 4th Conference on Principles of Security and Trust (POST'15), pp.219-238, 2015.

R. Künnemann and G. Steel, YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, Proc. 8th Workshop on Security and Trust Management (STM'12), pp.257-272, 2012.
DOI : 10.1007/978-3-642-38004-4_17

D. Longley and S. Rigby, An automatic search for security flaws in key management schemes, Computers & Security, vol.11, issue.1, pp.75-89, 1992.
DOI : 10.1016/0167-4048(92)90222-D

G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR, Proc. 2nd International Workshop on Tools and Algorithms for Construction and Analysis of Systems (TACAS'96), volume 1055 of LNCS, pp.147-166, 1996.
DOI : 10.1007/3-540-61042-1_43

S. Mödersheim, Abstraction by set-membership: verifying security protocols and web services with databases, Proc. 17th ACM Conference on Computer and Communications Security (CCS'10), pp.351-360, 2010.

I. Rakotonirina, Vérification automatique de protocoles de sécurité avec mémoire globale et boucles, 2014.

J. D. Ramsdell, D. J. Dougherty, J. D. Guttman, and P. D. Rowe, A Hybrid Analysis for Security Protocols with State, Proc. 11th International Conference on Integrated Formal Methods (IFM'14), pp.272-287, 2014.
DOI : 10.1007/978-3-319-10181-1_17

P. #11, Cryptographic Token Interface Standard. RSA Security Inc., v2, 2004.

B. Schmidt, Formal Analysis of Key-Exchange Protocols and Physical Protocols, 2012.

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.
DOI : 10.1109/CSF.2012.25

B. Schmidt, S. Meier, C. Cremers, and D. Basin, The tamarin prover for the symbolic analysis of security protocols, Proc. 25th International Conference on Computer Aided Verification (CAV'13), pp.696-701, 2013.

B. Schmidt, R. Sasse, C. Cremers, and D. A. Basin, Automated Verification of Group Key Agreement Protocols, 2014 IEEE Symposium on Security and Privacy, pp.179-194, 2014.
DOI : 10.1109/SP.2014.19

J. Shao, Y. Qin, D. Feng, and W. Wang, Formal Analysis of Enhanced Authorization in the TPM 2.0, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.273-284, 2015.
DOI : 10.1145/2714576.2714610

F. J. Thayer-fabrega, J. C. Herzog, and J. D. Guttman, Strand spaces: proving security protocols correct, Journal of Computer Security, vol.7, issue.2-3, pp.191-230, 1999.
DOI : 10.3233/JCS-1999-72-304

C. Trusted and . Group, TPM Specification version 1.2. Parts 1?3, revision 103, 2007.

A. Yubico, Yubico customer list, 2014. URL https://www.yubico.com/about/reference-customers/. Accessed: Do 13, p.3334, 201408-11.