Melanie Rieback (Faculty of Sciences Vrije Universiteit Amsterdam) Rina Steenkamp (CBP Dutch Data Protection Agency)

Size: px
Start display at page:

Download "Melanie Rieback (Faculty of Sciences Vrije Universiteit Amsterdam) Rina Steenkamp (CBP Dutch Data Protection Agency)"

Transcription

1 Confirmed speakers (C.V. s and abstract are given below) Adam Laurie (The Bunker) Christof Paar (Ruhr University Bochum) Patrick Pype (NXP) Matthew Reynolds (ECE, Duke University) Melanie Rieback (Faculty of Sciences Vrije Universiteit Amsterdam) Damith Ranasingh (Auto-ID Labs Cambridge) Bart Schermer (RFID Platform Nederland) Rina Steenkamp (CBP Dutch Data Protection Agency) Adam Stubblefield (Johns Hopkins University) Wouter Teepe (University of Nijmegen) Mark Witteman (Riscure) C.V. s Christof Paar Christof Paar has the Chair for Communication Security at Ruhr University in Bochum, Germany. From 1994 to 2001 he was with WPI in Massachusetts, USA. He co-founded, with Cetin Koc, the CHES (Cryptographic Hardware and Embedded Systems) workshop series, which has evolved into the leading forum for research in embedded security. His research interests cover highly efficient software and hardware of cryptography, security in pervasive applications, physical security, secure ad-hoc networks, and cryptanalytical hardware. He also works on real-world applications of embedded security, e.g., in RFID, consumer devices, cars, or smart cards. Christof has over 80 peer-reviewed publications in embedded security and holds several patents. He is co-founder of escrypt â Embedded Security and has extensive consulting experience with leading international companies. He has taught many industry courses, including courses at GTE, NASA, Motorola Research, and Philips Research. Christof will be with the University of Massachusetts at Amherst in the 2008/09 academic year.

2 Damith Ranasinghe Damith Ranasinghe is a member of the University of Cambridge Auto-ID Lab. He is based at the Institute for Manufacturing, in the Department of Engineering, where he is also invovled in the acitivities of the Distributed Information and Automation Laboratory. Damith is currently working on the PROMISE project, which is an EU-funded project that aims to improve the management of products throughout their lifecycle by better management of the product lifecycle information and also the BRIDGE project which aims to building world-wide RFID solutions that integrate into existing industrial business processes. Matt Reynolds Matt Reynolds is an Assistant Professor in the Department of Electrical and Computer Engineering at Duke University. He is also co-founder of the RFID systems firm ThingMagic Inc, and has been designing commercial RFID systems for over 10 years. Matt's research interests include energy efficiency at the physical layer of wireless communication, the physics of sensing and actuation, radiolocation, and digital signal processing. Matt holds a Ph.D. from the MIT Media Lab, where he was a Motorola Fellow, as well as S.B. and M.Eng. degrees in Electrical Engineering and Computer Science from MIT. Matt has one issued and 10 patents pending before the USPTO. Melanie Rieback Melanie Rieback is an Assistant Professor of Computer Science at the Vrije Universiteit in Amsterdam, in the group of Prof. Andrew Tanenbaum. Melanie's research concerns the security and privacy of Radio Frequency Identification (RFID) technology, and she leads multidisciplinary research teams on RFID security (RFID Malware) and RFID privacy management (RFID Guardian) projects. Her research has attracted worldwide media attention, appearing in the New York Times, Washington Post, Reuters, UPI, Computerworld, CNN, BBC, MSNBC, and many other print, broadcast, and online news outlets. Melanie's research has received several awards (Best Paper: IEEE PerCom '06, Best Paper: USENIX Lisa '06, NWO I/O Prize, VU Mediakomeet, ISOC Award finalist), and Melanie has also served as an invited expert for RFID security discussions with both the American and Dutch governments. In a past life, Melanie also worked on the Human Genome Project at the Whitehead Institute / MIT Center for Genome Research. Bart Schermer Bart Willem Schermer was born in Alkmaar on July 1, He studied law (IT law and criminal law) at Leiden University. Bart has worked as a legal consultant for ECP.NL since For the past 3 years Bart was the secretary of the RFID Platform Nederland. Currently he is partner in consulting firm Considerati BV and researcher at the University of Leiden. His work and research focuses on privacy and ambient intelligence. Rina Steenkamp Since November 2007, Rina Steenkamp joined the Dutch data protection authority as a technologist. One aspect of her work is assessing the privacy implications of the use of new technologies. For the previous twenty-five years she worked in various IT-related positions in both the private and the public sector.

3 Adam Stubbelfield Dr. Adam Stubblefield is an Assistant Research Professor in the Department of Computer Science at Johns Hopkins University. He has been involved in several public analyses of real-world systems including the Diebold voting machines, TIRIS RFID transponders, b WEP, and the SDMI candidate watermarking schemes. Stubblefield holds a BA in Mathematics from Rice University and a PhD in Computer Science from Johns Hopkins University. Wouter Teepe Wouter Teepe (1977) is researcher at the Digital Security group of the Radboud University Nijmegen, and was closely involved in the recent dismantling of the Mifare Classic RFID chip. He is the delegate of the Radboud University in the "wetenschapsforum" of the OV-chipkaart. Teepe is coordinator of the Centre for Cybercrime Studies (Cycris), an academical institute and think-tank that addresses the gap between legal and technological security. Teepe holds a Ph.D. from the University of Groningen, where he invented cryptographic protocols resolving chicken-and-egg like epistemical deadlock situations (i.e. do you know the secret that I know?). Moreover, he has proven unsoundness (not mere incompleteness!) of the old-style BAN authentication logic. In his spare time, Teepe makes party profile websites: online expert systems for political voting advice. Marc Witteman Marc Witteman has an MSc in Electrical Engineering from the Delft University of Technology in the Netherlands. He has been involved with security and smart card projects for over a decade and worked on applications in mobile communications, payment industry, identification, and pay television. In 2005 he was the first to report security issues with the introduction of e-passports. Since then he has been actively involved in security research and testing of RFID technology. Marc is Chief Technology Officer at Riscure and can be reached at witteman@riscure.com or via Abstracts Adam Laurie Practical RFID hacking without soldering irons (or patent attorneys) RFID is being embedded in everything... From Passports to Pants. Door Keys to Credit Cards. Mobile Phones to Trash Cans. Pets to People even! For some reason these devices have become the solution to every new problem, and we can't seem to get enough of them... This talk will look at the underlying technology, what it's being used for, how it works and why it's sometimes a BadIdea(tm) to rely on it for secure applications, and, more worryingly, how this off-the-shelf technology can be used against itself... Software and Hardware tools and techniques will be discussed and demonstrated, and a range of exploits examined in detail.

4 Christof Paar Breaking Authentication Tokens with Side-Channel Analysis: The Complete Break of KeeLoq KeeLoq remote keyless entry systems are widely used for access control purposes such as garage door openers or car anti-theft systems. We demonstrate how real-world implementations of KeeLoq can completely be broken with differential power analysis. Our attack combines side-channel cryptanalysis with specific properties of the KeeLoq algorithm. This allows for efficiently revealing both the secret key of a remote transmitter and the manufacturer key stored in a receiver. As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in few minutes. Once knowing the manufacturer key, we demonstrate how to disclose the secret key of a remote control and replicate it from a (long!) distance, just by eavesdropping of at most two messages. This key-cloning without physical access to the device has serious real-world security implications. Unlike purely mathematical attacks against KeeLoq, our analysis allows to break both hoping code ("rolling code") and challenge-and-response ("IFF") protocols with KeeLoq, and it is applicable to virtually all key derivation modes. Finally, we mount a denial-of-service attack on a KeeLoq access control system. The proposed attacks have been verified on several commercial realizations of KeeLoq. One particularly worrysome aspect of our attack is that is most likely applicable even if KeeLoq would be replaced by cryptographically stronger algorithms such as AES or 3DES, as long as the implementation is not protected against side-channel attacks. Patrick Pype, NXP Semiconductors From Barcodes to the Internet of Things The first patent for a barcode dates from Commercial use started in 1966 and in the 1980ies success has been proliferating tremendously. RFID technology has been around since 1920 in defence applications, but only started to become commercially end of the 20 th century, replacing barcodes and rapidly being applied in a wide range of application domains, as e.g. transportation & logistics, retail, passports, health cards, transport ticketing, access badges & keys, animal tagging & food safety. Initial pilot projects demonstrating the benefits of using RFID & NFC have turned into massive deployments in both industrial & consumer applications. A widespread vision exists that this will evolve into a society of the Internet-of-Things, where everything is connected and can communicate with everything. Therefore a lot of attention is paid on the societal impact of the RFID technology, including privacy and security aspects. A tradeoff analysis can be made of costs versus security for every type of application, while protection of privacy remains a condition sine qua non for everything. Therefore a tight cooperation between industry, universities, consumer groups and standardization committees is needed to ensure that the Internet-of-Things is not evolving into a Big Brother is watching you society, but into a society which is beneficial for all of us and makes our life much more simple and easy, without endangering our private lives.

5 Damith Ranasinghe Exploring lightweight security mechanisms for RFID and developments from a European project securing networked RFID systems Matt Reynolds RFID Security at the Physical Layer: Securing the tag read-zone Most recent work in RFID security has concentrated on strengthening data uthentication and encryption schemes to protect tag data itself. In this talk I will concentrate on answering the often-neglected question of "WHERE is the RFID tag at the moment it is read?" This question is important because many RFID application scenarios include an implicit use of an RFID tag's read-zone as a proxy for human intent, for example in a door access scenario, in a passport reader, at a point-of-sale terminal, or when giving access to a specific subway turnstile. I will show some of the ways this question is answered today, present some vulnerability scenarios, and present a few more robust approaches for future RFID systems. Melanie Rieback The RFID Guardian This talk will present the design and implementation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. Radio Frequency Identification (RFID) tags are remotely-powered data carriers, that are often touted as "computers of the future", that bring intelligence to our homes and offices, optimize our supply chains, and keep a watchful eye on our pets, livestock, and kids. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components; compatible with the ISO 15693/14443 (13.56 MHz) RFID standards, it performs RFID tag emulation and selective RFID tag jamming. Bart Schermer Security, consumers and RFID In his talk Bart Schermer will place the issue of security in the broader perspective of privacy and consumer protection. His talk will focus on several security incidents featuring RFID, how these have impacted consumers, and how companies and politicians have responded to these incidents. From these examples he will give suggestions on how companies, academia, and politicians should move forward on this issue.

6 Rina Steenkamp RFID and privacy Public transport cards, the biometric passport, office ID tokens... RFID is increasingly used for purposes that involve gathering and processing personal data. When planning and designing RFID applications that involve the use of personal data, it's extremely important to recognize and address the privacy implications at an early stage. Adam Stubblefield Vulnerabilities in RFID Systems Vulnerabilities in RFID systems present unique challenges due to the scale of deployments, the disconnected nature of tags, and resource limitations that influence "patchability." In this talk, I'll discuss RFID vulnerabilities, lessons that have been learned in designing for, reporting, and mitigating vulnerabilities in other arenas, and how we can apply those lessons to RFIDs. Wouter Teepe, Roel Verdult Dismantling the Mifare Classic On March 7, a team of students and researchers of the Radboud University Nijmegen completed a practical attack on the Mifare Classic chip, which is made by NXP. Due to responsible disclosure, we can not yet explain all the technical details of the practical attack. In our talk, we will tell in abstract terms what we did, what an attack scenario looks like, what the impact is on access control systems and public transport ticketing systems, and share some of the experiences we had in the last few months. Moreover, we will relate our results to the other recent results, such as the OV-chipkaart disposable ticket issue, and the results of Karsten Nohl and Henryk Pltz. Marc Witteman The security paradox of e-passports The first generation of electronic passports has arrived. Although the technology still has imperfections when it comes to safeguarding privacy, it offers good anti-forgery protection. The next generation of e-passports should include reliable biometrics and Extended Access Control. Those e-passports may offer strong protection against lookalike fraud, but this will only benefit immigration authorities if all e-passports contain biometrics (thus preventing fraudsters from exploring the weaknesses of legacy passports). Issuing countries must therefore go ahead in adopting e-passports with reliable biometrics. At the same time we see that currently applied biometric techniques are immature and not ready for this purpose.

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

RFID Guardian Back-end Security Protocol

RFID Guardian Back-end Security Protocol Master Thesis RFID Guardian Back-end Security Protocol Author: Hongliang Wang First Reader: Bruno Crispo Second Reader: Melanie Reiback Department of Computer Science Vrije Universiteit, Amsterdam The

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already

More information

From Barcodes to the Internet of Things. Patrick Pype Director European Affairs NXP Semiconductors

From Barcodes to the Internet of Things. Patrick Pype Director European Affairs NXP Semiconductors From Barcodes to the Internet of Things Patrick Pype Director European Affairs NXP Semiconductors RFID Security : Theory & Practice Lorentz Center, Leiden, March 28 th, 2008 Table of Contents 1. NXP Semiconductors

More information

RFID Tags Could Be The Next Biggest Danger

RFID Tags Could Be The Next Biggest Danger Page 1 of 5 Zoeken Home Papers Newsletters Magazines Events Over ons Contact français Nederlands ICT Business Solutions Channel Congess 2006 Special Cebit 2006 Abonnementen AGENDA Interviews Adverteren

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Data Protection Technical Guidance Radio Frequency Identification

Data Protection Technical Guidance Radio Frequency Identification Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

Network Security and Surveillance

Network Security and Surveillance G. Sivakumar Computer Science and Engineering IIT Bombay siva@iitb.ac.in October 29, 2004 1 Internet Security Overview Some Puzzles 2 3 Internet s Growth and Charter Some Puzzles Information AnyTime, AnyWhere,

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

Hacking Mifare Classic Cards. Márcio Almeida (marcioalma@gmail.com)

Hacking Mifare Classic Cards. Márcio Almeida (marcioalma@gmail.com) Hacking Mifare Classic Cards Márcio Almeida (marcioalma@gmail.com) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of

More information

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE. About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,

More information

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway

More information

Network Security Course Specifications2011-2012

Network Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Department of Information Technology Quality Assurance Unit Network Security Course Specifications2011-2012 Relevant program B.Sc. in Computers and

More information

Internet of Things. Hafedh Yahmadi LOGO

Internet of Things. Hafedh Yahmadi LOGO Internet of Things Hafedh Yahmadi LOGO Contents 1 What s Internet of Things 2 State of the Art of IoT 3 Challenges and Limitation of IoT 4 Future of IoT Ask google : where is my keys.? Where are my kids?

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

Significance of Tokenization in Promoting Cloud Based Secure Elements

Significance of Tokenization in Promoting Cloud Based Secure Elements Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,

More information

Data risks and Technology Trends. Stephen Reyes Saltmarsh, Cleaveland & Gund

Data risks and Technology Trends. Stephen Reyes Saltmarsh, Cleaveland & Gund Data risks and Technology Trends Stephen Reyes Saltmarsh, Cleaveland & Gund RFID as Security How to clone RFID Custom Built RFID Scanner Scanner bag Steps to help secure RFID entry systems Newer, higher

More information

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company 3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented

More information

The Future Of Cloud based Ticketing. Ernst Bovelander Director Advisory Services

The Future Of Cloud based Ticketing. Ernst Bovelander Director Advisory Services The Future Of Cloud based Ticketing Ernst Bovelander Director Advisory Services UL and the UL logo are trademarks of UL LLC 2014 1 Goal for today Establish a route for enabling Cloud Based Ticketing Introduction

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

All You Can Eat. Breaking a Real-World Contactless Payment System

All You Can Eat. Breaking a Real-World Contactless Payment System All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {Timo.Kasper,

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

ATTPS Publication: Trustworthy ICT Taxonomy

ATTPS Publication: Trustworthy ICT Taxonomy Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Analysis of the MIFARE Classic used in the OV-Chipkaart project

Analysis of the MIFARE Classic used in the OV-Chipkaart project Analysis of the MIFARE Classic used in the OV-Chipkaart project Gerhard de Koning Gans Radboud University Nijmegen Supervisors Thesis 584 Jaap-Henk Hoepman Gerhard de Koning Gans Flavio D. Garcia Version

More information

RFIDs and European Policies

RFIDs and European Policies ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

How To Get A Power Station To Work With A Power Generator Without A Substation

How To Get A Power Station To Work With A Power Generator Without A Substation Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE

More information

Cloud Computing Security

Cloud Computing Security 14 International Journal of Ambient Computing and Intelligence, 3(1), 14-19, January-March 2011 Cloud Computing Security Sean Carlin, University of Ulster, UK Kevin Curran, University of Ulster, UK ABSTRACT

More information

Security Challenges for User-Oriented RFID Applications within the Internet of Things

Security Challenges for User-Oriented RFID Applications within the Internet of Things Security Challenges for User-Oriented RFID Applications within the Internet of Things G.P. HANCKE, K. MARKANTONAKIS and K.E. MAYES ISG Smart Card Centre Royal Holloway, University of London UNITED KINGDOM

More information

Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards

Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

Defending the Internet of Things

Defending the Internet of Things Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity

More information

Trends and Challenges in IT Security. itec08, Darmstadt, 6th Nov. 2008

Trends and Challenges in IT Security. itec08, Darmstadt, 6th Nov. 2008 Trends and Challenges in IT Security Claudia Eckert Fraunhofer Institute for Secure Information Technology SIT Darmstadt, Germany, Darmstadt, 6th Nov. 2008 Outline 1. Internet of smart Things and Services

More information

Reviving smart card analysis

Reviving smart card analysis Reviving smart card analysis Christopher Tarnovsky Karsten Nohl chris@flylogic.net nohl@srlabs.de Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

RFID Guardian Back-end Security Protocol

RFID Guardian Back-end Security Protocol Master Thesis RFID Guardian Back-end Security Protocol Author: Hongliang Wang First Reader: Bruno Crispo Second Reader: Melanie Reiback Department of Computer Science Vrije Universiteit, Amsterdam The

More information

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Strong Authentication for Future Web Applications

Strong Authentication for Future Web Applications Strong Authentication for Future Web Applications Chris Williams Leidos, Inc. July 18, 2014 For W3C Identity in the Browser Workshop Abstract Leidos (formerly SAIC), has been using strong authentication

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Risks of Offline Verify PIN on Contactless Cards

Risks of Offline Verify PIN on Contactless Cards Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nicholas Little, and Aad van Moorsel School of Computing Science, Newcastle University, Newcastle upon Tyne, UK {martin.emms,budi.arief,n.little,aad.vanmoorsel}@ncl.ac.uk

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population. 1. What is the current status of the project? INDECT started the 3rd year of work. Almost 3 years are ahead of the project. All project tasks are realized according to the schedule. Current status of the

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

Target Security Breach

Target Security Breach Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected

More information

Workshop Highlights: Mass. Integrated Transportation Payments Security and Privacy

Workshop Highlights: Mass. Integrated Transportation Payments Security and Privacy Workshop Highlights: Mass. Integrated Transportation Payments Security and Privacy http://www.ecs.umass.edu/umass_itps_workshop/ UMass President s Science & Technology Initiative UMass Amherst + UMass

More information

Growth through partnerships and licensing technologies

Growth through partnerships and licensing technologies Growth through partnerships and licensing technologies Standards support Innovation Jens N. Albers, CEO AIM-D board member International Conference on Standardization and Innovation @ CERN, Geneva Overview

More information

WHITE PAPER. Enterprise Wireless LAN Security

WHITE PAPER. Enterprise Wireless LAN Security WHITE PAPER Enterprise Wireless LAN Security Preface This paper describes the challenges today s administrators face when planning data protection for their wireless networks. Paramount in this discussion

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

EIT ICT Labs MASTER SCHOOL. Specialisations

EIT ICT Labs MASTER SCHOOL. Specialisations EIT ICT Labs MASTER SCHOOL Specialisations S&P EIT ICT Labs Master Programme Security & Privacy The Learning outcomes of this major are: Understanding the concepts and technologies for achieving confidentiality,

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement !!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$

More information

Mobile and Contactless Payment Security

Mobile and Contactless Payment Security Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.

More information

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Threat Modeling for offline NFC Payments

Threat Modeling for offline NFC Payments Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,

More information

How Cisco Tracks RFID with Active RFID and Wireless LANs

How Cisco Tracks RFID with Active RFID and Wireless LANs How Tracks RFID with Active RFID and Wireless LANs Active RFID tags and WLANs ensure compliance with corporate finance and government regulations. IT Case Study / Wireless / RFID Solutions: Maintaining

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information