K. S. H.
Koscher, . Checkoway,
Czeskis, F. Roesner, S. Patel, D. McCoy, B. Kantor, D.
T. Kohno, nderson,
Shacham, and S. Savage.
Experimental security analysis
sium on Security and Privacy, May 2010.  M. Kuhn, H. Luecken, and N. O. Tippenhauer.
impulse radio based distance bounding. Workshop on Positioning, Navigation and
In Proc. of the Communication
(WPNC), 2010.  J.-Y. Lee and R. Scholtz
. Ranging in a Dense Multipath
Environment Using an UWB Radio Link. IEEE Journal on Selected reas in Communications, 20(9), December 2002.
 P. Lepek and P. Hartanto.
RF design consider-
for passive entry
motive compilation, Volume 6, page 20.
cle passive entry s.pdf.  Microchip Technology Inc.
Passive keyless entry
(PKE) reference design, users manual. ww1.microchip.com/downloads/en/DeviceDoc/DS-
21986 .pdf.  J. Munilla,
. Ortiz, and
. Peinado. Distance bounding
protocols with void-challenges for RFID. Printed handout at
the Workshop on RFID Security – RFIDSec 06, July 2006.
/vehicle access/rke/.  C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, and . Moradi.
KeeLoq and side-channel analysis-evolution of an attack. Fault Diagnosis and Tolerance in Cryptography, Workshop
on, 0:65–69, 2009.  P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade,
D. Basin, S. Capkun, and J.-P. Hubaux. Secure Neigh-
borhood Discovery: d Hoc Networking
Fundamental Element for Mobile IEEE Communications Magazine,
46(2):132–139, February 2008. . Perrig, M. Luk, and C. Kuo. Message-in-a-bottle: User-
friendly and secure key deployment for sensor nodes. In Proc. of the CM Conference on Embedded Networked Sen-
sor System (SenSys), October 2007.  M. Poturalski, P. Papadimitratos, and J.-P. Hubaux. Towards
Provable Secure Neighbor Discovery in Wireless Networks. In Proc. of the 6th CM workshop on formal methods in
security engineering, 2008.  K. B. Rasmussen and S. Capkun. Location privacy of dis-
tance bounding protocols. In CCS ’08: Proceedings of the 15th CM conference on Computer and Communications
Security, pages 149–160, New York, NY, US , 2008. CM.  K. B. Rasmussen and S. Capkun. Realization of RF distance
bounding. In Proc. of the 19th USENIX Security Symposium,
2010.  N. Sastry, U. Shankar, and D. Wagner. Secure verification of
location claims. In WiSe ’03: Proceedings of the 2nd CM workshop on Wireless security, New York, NY, US , 2003.
CM.  P. Schaller, B. Schmidt, D. Basin, and S. Capkun. Modeling
and verifying physical properties of security protocols for wireless networks. In 22nd IEEE Computer Security Foun- dations Symposium, pages 109–123. IEEE Computer Soci- ety Washington, DC, US , 2009.
 P. Schaller, B. Schmidt, D. Basin, and S. Capkun. Model- ing and verifying physical properties of security protocols for wireless networks. In CSF ’09: Proceedings of the 2009 22nd IEEE Computer Security Foundations Sympo- sium, pages 109–123, Washington, DC, US , 2009. IEEE Computer Society.  S. Sedighpour, S. Capkun, S. Ganeriwal, and M. Srivas- tava. Implementation of attacks on ultrasonic ranging sys- tems (demo). In Proc. of the CM Intl. Conference on Em- bedded Networked Sensor Systems (Sensys), 2005.  K. Tan, J. Zhang, J. Fang, H. Liu, Y. Ye, S. Wang, Y. Zhang, H. Wu, W. Wang, and G. M. Voelker. Sora: high perfor- mance software radio using general purpose multi-core pro- cessors. In Proc. of the 6th USENIX symposium on Net- worked Systems Design and Implementation (NSDI), pages 75–90, Berkeley, US , 2009. USENIX ssociation.
 Texas Instruments.
Car access system:
 N. O. Tippenhauer and S. Capkun. Id-based secure distance
bounding and localization. In Proc. of the European Sympo- sium on Research in Computer Security, 2009.  T. Waraksa, K. Fraley, R. Kiefer, D. Douglas, and L. Gilbert.
Passive keyless entry system. US patent 4942393, 1990.