X hits on this document

PDF document

Relay ttacks on Passive Keyless Entry and Start Systems in Modern Cars - page 15 / 15

76 views

0 shares

1 downloads

0 comments

15 / 15

[26]

K. S. H.

Koscher, . Checkoway,

Czeskis, F. Roesner, S. Patel, D. McCoy, B. Kantor, D.

T. Kohno, nderson,

Shacham, and S. Savage.

Experimental security analysis

of

a

modern

automobile.

In

Proc.

of

the

31st

IEEE

Sympo-

sium on Security and Privacy, May 2010. [27] M. Kuhn, H. Luecken, and N. O. Tippenhauer.

UWB

impulse radio based distance bounding. Workshop on Positioning, Navigation and

In Proc. of the Communication

(WPNC), 2010. [28] J.-Y. Lee and R. Scholtz

. Ranging in a Dense Multipath

Environment Using an UWB Radio Link. IEEE Journal on Selected reas in Communications, 20(9), December 2002.

[29] P. Lepek and P. Hartanto.

RF design consider-

ations

for passive entry

systems.

tmel

auto-

motive compilation, Volume 6, page 20.

Online:

http://www.atmel.com/dyn/resources/prod documents/arti-

cle passive entry s.pdf. [30] Microchip Technology Inc.

Passive keyless entry

(PKE) reference design, users manual. ww1.microchip.com/downloads/en/DeviceDoc/DS-

Online:

21986 .pdf. [31] J. Munilla,

. Ortiz, and

. Peinado. Distance bounding

protocols with void-challenges for RFID. Printed handout at

the Workshop on RFID Security – RFIDSec 06, July 2006.

[32] NXP

Semiconductors.

Passive

keyless

entry

systems.

Online:

http://www.nxp.com/applications/automotive-

/vehicle access/rke/. [33] C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, and . Moradi.

KeeLoq and side-channel analysis-evolution of an attack. Fault Diagnosis and Tolerance in Cryptography, Workshop

on, 0:65–69, 2009. [34] P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade,

D. Basin, S. Capkun, and J.-P. Hubaux. Secure Neigh-

borhood Discovery: d Hoc Networking

.

Fundamental Element for Mobile IEEE Communications Magazine,

[35]

46(2):132–139, February 2008. . Perrig, M. Luk, and C. Kuo. Message-in-a-bottle: User-

friendly and secure key deployment for sensor nodes. In Proc. of the CM Conference on Embedded Networked Sen-

sor System (SenSys), October 2007. [36] M. Poturalski, P. Papadimitratos, and J.-P. Hubaux. Towards

Provable Secure Neighbor Discovery in Wireless Networks. In Proc. of the 6th CM workshop on formal methods in

security engineering, 2008. [37] K. B. Rasmussen and S. Capkun. Location privacy of dis-

tance bounding protocols. In CCS ’08: Proceedings of the 15th CM conference on Computer and Communications

Security, pages 149–160, New York, NY, US , 2008. CM. [38] K. B. Rasmussen and S. Capkun. Realization of RF distance

bounding. In Proc. of the 19th USENIX Security Symposium,

2010. [39] N. Sastry, U. Shankar, and D. Wagner. Secure verification of

location claims. In WiSe ’03: Proceedings of the 2nd CM workshop on Wireless security, New York, NY, US , 2003.

CM. [40] P. Schaller, B. Schmidt, D. Basin, and S. Capkun. Modeling

and verifying physical properties of security protocols for wireless networks. In 22nd IEEE Computer Security Foun- dations Symposium, pages 109–123. IEEE Computer Soci- ety Washington, DC, US , 2009.

[41] P. Schaller, B. Schmidt, D. Basin, and S. Capkun. Model- ing and verifying physical properties of security protocols for wireless networks. In CSF ’09: Proceedings of the 2009 22nd IEEE Computer Security Foundations Sympo- sium, pages 109–123, Washington, DC, US , 2009. IEEE Computer Society. [42] S. Sedighpour, S. Capkun, S. Ganeriwal, and M. Srivas- tava. Implementation of attacks on ultrasonic ranging sys- tems (demo). In Proc. of the CM Intl. Conference on Em- bedded Networked Sensor Systems (Sensys), 2005. [43] K. Tan, J. Zhang, J. Fang, H. Liu, Y. Ye, S. Wang, Y. Zhang, H. Wu, W. Wang, and G. M. Voelker. Sora: high perfor- mance software radio using general purpose multi-core pro- cessors. In Proc. of the 6th USENIX symposium on Net- worked Systems Design and Implementation (NSDI), pages 75–90, Berkeley, US , 2009. USENIX ssociation.

[44] Texas Instruments.

Car access system:

Car ac-

cess

solutions

from Texas

Instruments.

Online:

http://focus.ti.com/docs/solution/folders/print/528.html.

[45] N. O. Tippenhauer and S. Capkun. Id-based secure distance

bounding and localization. In Proc. of the European Sympo- sium on Research in Computer Security, 2009. [46] T. Waraksa, K. Fraley, R. Kiefer, D. Douglas, and L. Gilbert.

Passive keyless entry system. US patent 4942393, 1990.

Document info
Document views76
Page views79
Page last viewedFri Jan 20 12:55:51 UTC 2017
Pages15
Paragraphs699
Words11298

Comments