메뉴 건너뛰기




Volumn , Issue , 2014, Pages 49-64

Chip and skim: Cloning EMV cards with the pre-play attack

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CLONE CELLS; CLONING; ELECTRONIC COMMERCE; INTERNET PROTOCOLS; MALWARE; RANDOM NUMBER GENERATION;

EID: 84914105014     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.11     Document Type: Conference Paper
Times cited : (84)

References (24)
  • 4
    • 84914110310 scopus 로고    scopus 로고
    • Le Parisien, 24 January
    • S. Sellami, "L'imparable escroquerie à la carte bancaire," Le Parisien, 24 January 2012, http://www.leparisien.fr/faitsdivers/l-imparable-escroquerie-a-la-carte-bancaire-24-01-2012-1826971.php.
    • (2012) L'Imparable Escroquerie À la Carte Bancaire
    • Sellami, S.1
  • 10
    • 84914173082 scopus 로고    scopus 로고
    • EMVCo, LLC, June
    • EMV 4.2, EMVCo, LLC, June 2004, http://www.emvco.com/.
    • (2004) EMV 4.2
  • 12
    • 84914110308 scopus 로고    scopus 로고
    • Jackpotting automated teller machines redux
    • July
    • B. Jack, "Jackpotting automated teller machines redux," Presentation at Black Hat USA, July 2010, http://blackhat.com/html/bh-us-10/bh-us-10-archives.html#Jack.
    • (2010) Presentation at Black Hat USA
    • Jack, B.1
  • 13
    • 84914110307 scopus 로고    scopus 로고
    • Credit Call
    • EMV.LIB Integration Guide, Credit Call, 2009, http://www.level2kernel.com/emvlib documentation.html.
    • (2009) EMV.LIB Integration Guide
  • 14
    • 84914110306 scopus 로고    scopus 로고
    • SC Magazine, October
    • ATM Malware, SC Magazine, October 2013, http://www.pcworld.com/article/2058360/atm-malwaremay-spread-from-mexico-to-englishspeaking-world.html.
    • (2013) ATM Malware
  • 15
    • 84914094299 scopus 로고    scopus 로고
    • Formal analysis of the EMV protocol suite
    • ser. LNCS, S. Moedersheim and C. Palamidessi, Eds., Springer, March
    • J. de Ruiter and E. Poll, "Formal analysis of the EMV protocol suite," in Theory of Security and Applications (TOSCA 2011), ser. LNCS, S. Moedersheim and C. Palamidessi, Eds., vol. 6693. Springer, March 2011, pp. 113-129.
    • (2011) Theory of Security and Applications (TOSCA 2011) , vol.6693 , pp. 113-129
    • De Ruiter, J.1    Poll, E.2
  • 18
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • Dec.
    • R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, pp. 993-999, Dec. 1978.
    • (1978) Commun. ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 21
    • 85066944987 scopus 로고    scopus 로고
    • Keep your enemies close: Distance bounding against smartcard relay attacks
    • August
    • S. Drimer and S. J. Murdoch, "Keep your enemies close: Distance bounding against smartcard relay attacks," in USENIX Security Symposium, August 2007.
    • (2007) USENIX Security Symposium
    • Drimer, S.1    Murdoch, S.J.2
  • 22
    • 77955225978 scopus 로고    scopus 로고
    • Reliability of chip & PIN evidence in banking disputes
    • Pario Communications, November
    • S. J. Murdoch, "Reliability of chip & PIN evidence in banking disputes," in Digital Evidence and Electronic Signature Law Review, vol. 6. Pario Communications, November 2009, pp. 98-115, ISBN 0-9543245-9-5.
    • (2009) Digital Evidence and Electronic Signature Law Review , vol.6 , pp. 98-115
    • Murdoch, S.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.