[go: up one dir, main page]

Bogari et al., 2012 - Google Patents

An investigative analysis of the security weaknesses in the evolution of RFID enabled passport

Bogari et al., 2012

View PDF
Document ID
4873846880877756931
Author
Bogari E
Zavarsky P
Lindskog D
Ruhl R
Publication year
Publication venue
International Journal of Internet Technology and Secured Transactions

External Links

Snippet

Since the introduction of radio frequency identification (RFID) enabled passports, the system has been plagued with various vulnerability issues that prove to compromise the e-passport security. To date, three generations of e-passports have been introduced by the International …
Continue reading at www.cin.ufpe.br (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
US10154021B1 (en) Securitization of temporal digital communications with authentication and validation of user and access devices
Madhusudhan et al. Dynamic ID-based remote user password authentication schemes using smart cards: A review
Bogari et al. An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
Liu et al. A secure data backup scheme using multi‐factor authentication
Houy et al. Security aspects of cryptocurrency wallets—a systematic literature review
Wang et al. Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Kumar A New Secure Remote User Authentication Scheme with Smart Cards.
Yin et al. Protecting private data by honey encryption
Kushwaha et al. A brief survey of challenge–response authentication mechanisms
Praveen Kumar et al. A password less authentication protocol for multi-server environment using physical unclonable function
Nithyanand A Survey on the Evolution of Cryptographic Protocols in ePassports
Radanliev Cyber-attacks on Public Key Cryptography
Eldefrawy et al. Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone
Jensen et al. A secure credit card protocol over NFC
Karger Privacy and security threat analysis of the federal employee personal identity verification (PIV) program
Zhang et al. An anti-counterfeiting RFID privacy protection protocol
Sinha A survey of system security in contactless electronic passports
Kc et al. Preventing attacks on machine readable travel documents (MRTDs)
Weiner et al. Security analysis of a widely deployed locking system
Chaabouni et al. The extended access control for machine readable travel documents
Hakami et al. Secure Transaction Framework based on Encrypted One-time Password and Multi-factor
Sood Phishing Attacks: A Challenge Ahead
Mishra et al. Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme
Prakash et al. A generic framework to enhance two-factor authentication in cryptographic smart-card applications
Hussain et al. SECURE BIO-RFID SYSTEM IN ORGANIZATIONS