-
1
-
-
85076467318
-
-
abc7news. Key fob car thefts, 2013. http://abc7news.com/archive/9079852.
-
(2013)
Key Fob Car Thefts
-
-
-
7
-
-
44449137280
-
Attacks on the Keeloq block cipher and authentication systems
-
rfidsec07
-
Bogdanov, A. Attacks on the KeeLoq Block Cipher and Authentication Systems. In Workshop on RFID Security (RFID-Sec’08)(2007). rfidsec07.etsit.uma.es/ slides/papers/paper-22.pdf.
-
(2007)
Workshop on RFID Security (RFID-Sec’08)
-
-
Bogdanov, A.1
-
8
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
USENIX Association
-
Bono, S. C., Green, M., Stubblefield, A., Juels, A., Rubin, A. D., and Szydlo, M. Security analysis of a cryptographically-enabled RFID device. In 14th USENIX Security Symposium (USENIX Security 2005) (2005), USENIX Association, pp. 1–16.
-
(2005)
14th USENIX Security Symposium (USENIX Security 2005)
, pp. 1-16
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
9
-
-
85064838175
-
Breaking the security of physical devices
-
August
-
Cesare, S. Breaking the security of physical devices. Presentation at Blackhat’14, August 2014.
-
(2014)
Presentation at Blackhat’14
-
-
Cesare, S.1
-
10
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
USENIX Association
-
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., and Kohno, T. Comprehensive experimental analyses of automotive attack surfaces. In 20th USENIX Security Symposium (USENIX Security 2011) (2011), USENIX Association, pp. 77–92.
-
(2011)
20th USENIX Security Symposium (USENIX Security 2011)
, pp. 77-92
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
11
-
-
70350431832
-
Practical algebraic attacks on the Hitag2 stream cipher
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Courtois, N. T., O’Neil, S., and Quisquater, J.-J. Practical algebraic attacks on the Hitag2 stream cipher. In 12th Information Security Conference (ISC 2009) (2009), vol. 5735 of Lecture Notes in Computer Science, Springer-Verlag, pp. 167–176.
-
(2009)
12th Information Security Conference (ISC 2009)
, vol.5735
, pp. 167-176
-
-
Courtois, N.T.1
O’Neil, S.2
Quisquater, J.-J.3
-
12
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the Keeloq code hopping scheme
-
of LNCS, Springer
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M. T. M. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Advances in Cryptology – CRYPTO’08 (2008), vol. 5157 of LNCS, Springer, pp. 203–220.
-
(2008)
Advances in Cryptology – CRYPTO’08
, vol.5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
13
-
-
85076461441
-
-
European Automobile Manufacturers Associaction. New passenger car registrations, 2015. available at http://www.acea.be/uploads/press_releases_files/ 20151016_PRPC_1509_FINAL.pdf.
-
(2015)
New Passenger Car Registrations
-
-
-
14
-
-
80054793984
-
Relay attacks on passive keyless entry and start systems in modern cars
-
The Internet Society
-
Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 (2011), The Internet Society.
-
(2011)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2011
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
15
-
-
44449126213
-
A practical attack on KeeLoq
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Indesteege, S., Keller, N., Dunkelmann, O., Biham, E., and Preneel, B. A practical attack on KeeLoq. In 27th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 2008) (2008), vol. 4965 of Lecture Notes in Computer Science, Springer-Verlag, pp. 1–8.
-
(2008)
27th International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology (EUROCRYPT 2008)
, vol.4965
, pp. 1-8
-
-
Indesteege, S.1
Keller, N.2
Dunkelmann, O.3
Biham, E.4
Preneel, B.5
-
16
-
-
85020218056
-
Drive it like you hacked it: New attacks and tools to wirelessly steal cars
-
August
-
Kamkar, S. Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars. Presentation at DEFCON 23, August 2015.
-
(2015)
Presentation at DEFCON
, vol.23
-
-
Kamkar, S.1
-
17
-
-
70350678744
-
Breaking keeloq in a flash: On extracting keys at lightning speed
-
B. Preneel, Ed.,. of LNCS, Springer
-
Kasper, M., Kasper, T., Moradi, A., and Paar, C. Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed. In Progress in Cryptology - AFRICACRYPT’09 (2009), B. Preneel, Ed., vol. 5580 of LNCS, Springer, pp. 403–420.
-
(2009)
Progress in Cryptology - AFRICACRYPT’09
, vol.5580
, pp. 403-420
-
-
Kasper, M.1
Kasper, T.2
Moradi, A.3
Paar, C.4
-
18
-
-
81455132092
-
Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild
-
Kasper, T., Oswald, D., and Paar, C. Wireless security threats: Eavesdropping and detecting of active RFIDs and remote controls in the wild. In 19th International Conference on Software, Telecommunications and Computer Networks – SoftCOM’11 (2011), pp. 1–6.
-
(2011)
19th International Conference on Software, Telecommunications and Computer Networks – SoftCOM’11
, pp. 1-6
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
19
-
-
85076468722
-
-
Keyline S.p.A. RK60 guide, 2015. available at http://www.keyline.it/files/teste-elettroniche/electronic_ heads_guide_13316.pdf.
-
(2015)
A. RK60 Guide
-
-
Keyline, S.1
-
20
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
IEEE Computer Society
-
Koscher, K., Czeskis, A., Roesner, F., Patel, F., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., and Savage, S. Experimental security analysis of a modern automobile. In 31rd IEEE Symposium on Security and Privacy (S&P 2010) (2010), IEEE Computer Society, pp. 447–462.
-
(2010)
31rd IEEE Symposium on Security and Privacy (S&P 2010)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, F.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
22
-
-
58949086800
-
Related-key rectangle attack on 36 rounds of the XTEA block cipher
-
Lu, J. Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8, 1 (2008), 1–11.
-
(2008)
International Journal of Information Security
, vol.8
, Issue.1
, pp. 1-11
-
-
Lu, J.1
-
23
-
-
77949613968
-
A new remote keyless entry system resistant to power analysis attacks
-
Moradi, A., and Kasper, T. A new remote keyless entry system resistant to power analysis attacks. In Information, Communications and Signal Processing – ICICS 2009 (2009), IEEE, pp. 1–6.
-
(2009)
Information, Communications and Signal Processing – ICICS 2009
, pp. 1-6
-
-
Moradi, A.1
Kasper, T.2
-
28
-
-
83755180536
-
Cube cryptanalysis of Hitag2 stream cipher
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Sun, S., Hu, L., Xie, Y., and Zeng, X. Cube cryptanalysis of Hitag2 stream cipher. In 10th International Conference on Cryptology and Network Security (CANS 2011) (2011), vol. 7092 of Lecture Notes in Computer Science, Springer-Verlag, pp. 15–25.
-
(2011)
10th International Conference on Cryptology and Network Security (CANS 2011)
, vol.7092
, pp. 15-25
-
-
Sun, S.1
Hu, L.2
Xie, Y.3
Zeng, X.4
-
30
-
-
84954096438
-
-
PhD thesis, Radboud University, The Netherlands and KU Leuven, Belgium, April
-
Verdult, R. The (in)security of proprietary cryptography. PhD thesis, Radboud University, The Netherlands and KU Leuven, Belgium, April 2015.
-
(2015)
The (in)Security of Proprietary Cryptography
-
-
Verdult, R.1
-
31
-
-
84990827825
-
Cryptanalysis of the Megamos Crypto automotive immobilizer
-
login
-
Verdult, R., and Garcia, F. D. Cryptanalysis of the Megamos Crypto automotive immobilizer. USENIX;login: 40, 6 (2015), pp. 17–22.
-
(2015)
USENIX
, vol.40
, Issue.6
, pp. 17-22
-
-
Verdult, R.1
Garcia, F.D.2
-
32
-
-
84966893349
-
Gone in 360 seconds: Hijacking with Hitag2
-
August USENIX Association
-
Verdult, R., Garcia, F. D., and Balasch, J. Gone in 360 seconds: Hijacking with Hitag2. In USENIX Security Symposium (August 2012), USENIX Association, pp. 237–252. https://www.usenix.org/system/ files/conference/usenixsecurity12/ sec12-final95.pdf.
-
(2012)
USENIX Security Symposium
, pp. 237-252
-
-
Verdult, R.1
Garcia, F.D.2
Balasch, J.3
-
33
-
-
84979836592
-
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
-
USENIX Association
-
Verdult, R., Garcia, F. D., and Ege, B. Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. In 22nd USENIX Security Symposium (USENIX Security 2013) (2015), USENIX Association, pp. 703–718.
-
(2015)
22nd USENIX Security Symposium (USENIX Security 2013)
, pp. 703-718
-
-
Verdult, R.1
Garcia, F.D.2
Ege, B.3
|