Tracking unmodified smartphones using wi-fi monitors

ABM Musa, J Eriksson - Proceedings of the 10th ACM conference on …, 2012 - dl.acm.org
Smartphones with Wi-Fi enabled periodically transmit Wi-Fi messages, even when not
associated to a network. In one 12-hour trial on a busy road (average daily traffic count …

Analysing unlinkability and anonymity using the applied pi calculus

M Arapinis, T Chothia, E Ritter… - 2010 23rd IEEE computer …, 2010 - ieeexplore.ieee.org
An attacker that can identify messages as coming from the same source, can use this
information to build up a picture of targets' behaviour, and so, threaten their privacy. In …

Formal models and techniques for analyzing security protocols: A tutorial

V Cortier, S Kremer - Foundations and Trends® in …, 2014 - nowpublishers.com
Security protocols are distributed programs that aim at securing communications by the
means of cryptography. They are for instance used to secure electronic payments, home …

Probabilistic relational verification for cryptographic implementations

G Barthe, C Fournet, B Grégoire, PY Strub… - ACM SIGPLAN …, 2014 - dl.acm.org
Relational program logics have been used for mechanizing formal proofs of various
cryptographic constructions. With an eye towards scaling these successes towards end-to …

Persistent clocks for batteryless sensing devices

J Hester, N Tobias, A Rahmati, L Sitanayah… - ACM Transactions on …, 2016 - dl.acm.org
Sensing platforms are becoming batteryless to enable the vision of the Internet of Things,
where trillions of devices collect data, interact with each other, and interact with people …

Practical eavesdrop** and skimming attacks on high-frequency RFID tokens

GP Hancke - Journal of Computer Security, 2011 - content.iospress.com
RFID systems often use near-field magnetic coupling to implement communication
channels. The advertised operational range of these channels is less than 10 cm and …

A survey of security and privacy issues in ePassport protocols

G Avoine, A Beaujeant, J Hernandez-Castro… - ACM Computing …, 2016 - dl.acm.org
This article examines in great detail the most relevant security and privacy issues affecting
the protocols used by contactless chips integrated in ePassports, and presents all relevant …

Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC

JB Almeida, M Barbosa, G Barthe… - Fast Software Encryption …, 2016 - Springer
We provide further evidence that implementing software countermeasures against timing
attacks is a non-trivial task and requires domain-specific software development processes …

{TARDIS}: Time and remanence decay in {SRAM} to implement secure protocols on embedded devices without clocks

A Rahmati, M Salajegheh, D Holcomb… - 21st USENIX Security …, 2012 - usenix.org
Lack of a locally trustworthy clock makes security protocols challenging to implement on
batteryless embedded devices such as contact smartcards, contactless smartcards, and …

F-BLEAU: fast black-box leakage estimation

G Cherubin, K Chatzikokolakis… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
We consider the problem of measuring how much a system reveals about its secret inputs.
We work in the black-box setting: we assume no prior knowledge of the system's internals …