Tracking unmodified smartphones using wi-fi monitors
Smartphones with Wi-Fi enabled periodically transmit Wi-Fi messages, even when not
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …
Analysing unlinkability and anonymity using the applied pi calculus
An attacker that can identify messages as coming from the same source, can use this
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …
Formal models and techniques for analyzing security protocols: A tutorial
Security protocols are distributed programs that aim at securing communications by the
means of cryptography. They are for instance used to secure electronic payments, home …
means of cryptography. They are for instance used to secure electronic payments, home …
Probabilistic relational verification for cryptographic implementations
Relational program logics have been used for mechanizing formal proofs of various
cryptographic constructions. With an eye towards scaling these successes towards end-to …
cryptographic constructions. With an eye towards scaling these successes towards end-to …
Persistent clocks for batteryless sensing devices
Sensing platforms are becoming batteryless to enable the vision of the Internet of Things,
where trillions of devices collect data, interact with each other, and interact with people …
where trillions of devices collect data, interact with each other, and interact with people …
Practical eavesdrop** and skimming attacks on high-frequency RFID tokens
GP Hancke - Journal of Computer Security, 2011 - content.iospress.com
RFID systems often use near-field magnetic coupling to implement communication
channels. The advertised operational range of these channels is less than 10 cm and …
channels. The advertised operational range of these channels is less than 10 cm and …
A survey of security and privacy issues in ePassport protocols
This article examines in great detail the most relevant security and privacy issues affecting
the protocols used by contactless chips integrated in ePassports, and presents all relevant …
the protocols used by contactless chips integrated in ePassports, and presents all relevant …
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
We provide further evidence that implementing software countermeasures against timing
attacks is a non-trivial task and requires domain-specific software development processes …
attacks is a non-trivial task and requires domain-specific software development processes …
{TARDIS}: Time and remanence decay in {SRAM} to implement secure protocols on embedded devices without clocks
Lack of a locally trustworthy clock makes security protocols challenging to implement on
batteryless embedded devices such as contact smartcards, contactless smartcards, and …
batteryless embedded devices such as contact smartcards, contactless smartcards, and …
F-BLEAU: fast black-box leakage estimation
We consider the problem of measuring how much a system reveals about its secret inputs.
We work in the black-box setting: we assume no prior knowledge of the system's internals …
We work in the black-box setting: we assume no prior knowledge of the system's internals …