![]() van Deursen, Ton ![]() ![]() in EuroPKI 2011 (2012) Detailed reference viewed: 96 (2 UL)![]() Van Deursen, Ton ![]() Doctoral thesis (2011) Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power ... [more ▼] Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power source make RFID tags useful in many applications, but also impose a strong need for secure RFID protocols. The first part of this thesis considers the analysis of untraceability of RFID protocols. We start by designing a formal syntax and semantics for security protocols. We define untraceability as a property on the traces of a protocol. We find new untraceability flaws in a number of RFID protocols. Furthermore, we show that indistinguishability-based proof models are incomparable to unpredictability-based proof models. The second part of this thesis is concerned with authentication of RFID protocols. Authentication ensures that agents can not be impersonated. We categorize new authentication attacks into algebraic replay attacks, man-in-the-middle attacks, compositionality attacks, and cryptanalytic attacks. The third part of this thesis deals with formalizing ownership in RFID systems and related security properties. In dynamic environments where RFID tags are exchanged, sold, or traded, the owner of a tag may change. We define secure ownership, exclusive ownership, secure ownership transfer, and desynchronization resistance. The fourth part of this thesis describes the problem of recovering memory structures of systems. We define the carving problem as recovering the structure of the memory, based on an attributed dump set. We design and implement algorithms to find commonalities and dissimilarities and apply them to a deployed RFID system. [less ▲] Detailed reference viewed: 94 (4 UL)![]() van Deursen, Ton ![]() in Privacy and Identity Management for Life (2011), 352 Detailed reference viewed: 68 (0 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Abstract book of 20th USENIX Security Symposium (2011) Detailed reference viewed: 40 (1 UL)![]() van Deursen, Ton ![]() ![]() in 6th Workshop on RFID Security (RFIDSec 2010) (2010) Detailed reference viewed: 85 (0 UL)![]() Chen, Xihui ![]() ![]() ![]() in Proc. 11th International Conference on Formal Engineering Methods (2009) Detailed reference viewed: 134 (2 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009) Detailed reference viewed: 100 (0 UL)![]() van Deursen, Ton ![]() ![]() in Information Processing Letters (2009), 110(2), 57-61 Detailed reference viewed: 90 (0 UL)![]() van Deursen, Ton ![]() ![]() in Third IFIP WG 11.2 International Workshop (2009) Detailed reference viewed: 89 (0 UL)![]() van Deursen, Ton ![]() ![]() in Electronic Notes in Theoretical Computer Science (2009), 244 Detailed reference viewed: 107 (1 UL)![]() van Deursen, Ton ![]() in eHealth Beyond the Horizon – Get IT There – Proceedings of MIE2008 – The XXIst International Congress on the European Federation for Medical Informatics (2008) Detailed reference viewed: 31 (0 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008) Detailed reference viewed: 105 (0 UL)![]() ![]() van Deursen, Ton ![]() ![]() in Proceedings of the 1st Workshop on Advances in RFID, AIR'08 (2008) Detailed reference viewed: 105 (1 UL)![]() van Deursen, Ton ![]() in Electronic Notes in Theoretical Computer Science (2008), 1997(2), 159-167 Detailed reference viewed: 86 (1 UL) |
||