메뉴 건너뛰기




Volumn , Issue , 2009, Pages 331-338

The dark side of security by obscurity: And cloning MiFare classic rail and building passes, anywhere, anytime

Author keywords

Access control; Contactless smart cards; Covert channels; Crime science; Critical application development management; Electronic subversion; Implementation backdoors; Industrial secrets; Information assurance; London oyster card; MiFare classic; OV chipkaart; Reverse engineering; RFID; Secure hardware devices

Indexed keywords

BACKDOORS; CONTACTLESS SMART CARD; COVERT CHANNELS; CRITICAL APPLICATIONS; ELECTRONIC SUBVERSION; HARDWARE DEVICES; INDUSTRIAL SECRETS; INFORMATION ASSURANCE;

EID: 74549123338     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (27)

References (13)
  • 1
    • 52949116081 scopus 로고    scopus 로고
    • A Practical Attack on the MIFARE Classic
    • Procedings of the 8th Smart Card Research and Advanced Applications, CARDIS 2008
    • de Koning Gans, G., Hoepman, J.-H., and Garcia, F. D. (2008). A Practical Attack on the MIFARE Classic. In Procedings of the 8th Smart Card Research and Advanced Applications, CARDIS 2008, LNCS.
    • (2008) LNCS
    • de Koning Gans, G.1    Hoepman, J.-H.2    Garcia, F.D.3
  • 2
    • 57049128814 scopus 로고    scopus 로고
    • Dismantling MIFARE Classic
    • Procedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008
    • Garcia, F. D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., and Wichers Schreur, R. (2008). Dismantling MIFARE Classic. In Procedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, LNCS.
    • (2008) LNCS
    • Garcia, F.D.1    de Koning Gans, G.2    Muijrers, R.3    van Rossum, P.4    Verdult, R.5    Wichers Schreur, R.6
  • 6
    • 84893081352 scopus 로고    scopus 로고
    • Reverse-Engineering a Cryptographic RFID Tag
    • San Jose, CA, USA. USENIX
    • Nohl, K., Evans, D., Starbug, and Plotz, H. (2008). Reverse-Engineering a Cryptographic RFID Tag. In 17th USENIX Security Symposium, pages 185-194, San Jose, CA, USA. USENIX.
    • (2008) 17th USENIX Security Symposium , pp. 185-194
    • Nohl, K.1    Evans, D.2    Starbug3    Plotz, H.4
  • 12
    • 50649108458 scopus 로고    scopus 로고
    • Breaking up is hard to do: Modeling security threats for smart cards
    • Berkeley, CA, USA. USENIX Association
    • Schneier, B. and Shostack, A. (1999). Breaking up is hard to do: modeling security threats for smart cards. In WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology, pages 19-19, Berkeley, CA, USA. USENIX Association.
    • (1999) WOST'99: Proceedings of the USENIX Workshop on Smartcard Technology , pp. 19-19
    • Schneier, B.1    Shostack, A.2
  • 13
    • 74549126294 scopus 로고    scopus 로고
    • The dark side of black box cryptography. In Advances in Cryptology
    • Young, A. and Yung, M. (1996). The dark side of black box cryptography. In Advances in Cryptology - CRYPTO'96.
    • (1996) CRYPTO , vol.96
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.