ebook img

Radio Frequency Identification. Security and Privacy Issues: 11th International Workshop, RFIDsec 2015 New York, NY, USA, June 23–24, 2015, Revised Selected Papers PDF

179 Pages·2015·8.129 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Radio Frequency Identification. Security and Privacy Issues: 11th International Workshop, RFIDsec 2015 New York, NY, USA, June 23–24, 2015, Revised Selected Papers

Stefan Mangard Patrick Schaumont (Eds.) Radio Frequency 0 Identification 4 4 9 S C N Security and Privacy Issues L 11th International Workshop, RFIDsec 2015 New York, NY, USA, June 23–24, 2015 Revised Selected Papers 123 Lecture Notes in Computer Science 9440 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen EditorialBoard David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zürich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany Moreinformationaboutthisseriesathttp://www.springer.com/series/7410 · Stefan Mangard Patrick Schaumont (Eds.) Radio Frequency Identification Security and Privacy Issues 11th International Workshop, RFIDsec 2015 New York, NY, USA, June 23–24, 2015 Revised Selected Papers ABC Editors StefanMangard PatrickSchaumont GrazUniversityofTechnology Blacksburg Graz Virginia Austria USA ISSN0302-9743 ISSN1611-3349 (electronic) LectureNotesinComputerScience ISBN978-3-319-24836-3 ISBN978-3-319-24837-0 (eBook) DOI10.1007/978-3-319-24837-0 LibraryofCongressControlNumber:2015949479 LNCSSublibrary:SL4–SecurityandCryptology SpringerChamHeidelbergNewYorkDordrechtLondon (cid:2)c SpringerInternationalPublishingSwitzerland2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,broad- casting,reproduction onmicrofilmsorinanyotherphysicalway,andtransmissionorinformationstorage andretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynowknown orhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher, theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication. Neitherthepublishernortheauthorsorthe editorsgiveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforanyerrorsor omissionsthatmayhavebeenmade. Printedonacid-freepaper SpringerInternationalPublishingAGSwitzerlandispartofSpringerScience+BusinessMedia (www.springer.com) Preface Welcometothe11thInternationalWorkshoponRFIDSecurity(RFIDsec),held attheNYITAuditoriumonBroadwayinNewYorkCity,NY,USA,duringJune 22–24, 2015. RFIDsec has been the main venue for new results in RFID system andimplementationsecurityforoveradecade.Theeventhas travelledtomany different places all overthe world.Drivenby the positive experience of2014,we co-located RFIDsec for the second time with WiSec, and we created a tightly integrated program that allowed attendees to hop from one event to the other. RFIDsec 2015 assembled four sessions with exciting results in RFID secu- rity. The four sessions collect ten regular papers, which were selected by the Program Committee after a rigorous review process out of 23 submissions. The review procedure included an individual review phase followed by a collective online discussion by the 22 members of the Technical ProgramCommittee with the program chairs. The Program Committee members were supported by 30 external reviewers. Besidesthetenacceptedpapers,theworkshopalsoincludedasharedkeynote with WiSec, an RFIDsec keynote talk and two tutorials. The shared keynote talk was given by Srdjan Capkun from ETH Zurich. In his talk “Why We Should Build a Secure Positioning Infrastructure,” Dr. Capkun discussed the main challenges in designing and building new positioning infrastructures that offer security and privacy by design. The keynote talk of RFIDsec 2015, “Hard- ware Trojans for ASICs and FPGAs,” was given by Christof Paar from Ruhr UniversityBochumandUniversityofMassachusettsAmherst.HardwareTrojans is a topic of rapidly increasing importance in modern complex digital eletron- ics, especially for those that have a trustworthy function. Dr. Paar shared his insights and latest research results into this problem. The first tutorial was on Contactless Payments, and it was given by Joeri de Ruiter from the Univer- sity of Birmingham. The contactless environment comes with very challenging problems in power provisioning and communications. Dr. de Ruiter explained the unique solutions that are enabled by sound cryptographic engineering. The second tutorial was on Anonymous Based Credentials (ABCs) in Theory and Practice, and it was given by Gergely Alpar from Radboud University. As ex- plained by Dr. Alpar, ABCs handle the important issue of user authentication and authorization while at the same time ensuring the user’s privacy. The program chairs would like to thank the general chairs, Paolo Gasti and Ramesh Karri, for their support in hosting RFIDsec 2015 in the Big Apple. We are also greatlyindebted to the 22 members ofthe Technical ProgramCommit- tee, who provided valuable technical insights in the assembly of the program. Finally, we would like to thank the RFIDsec Steering Committee members for VI Preface their guidance in setting up the 11th edition of this exciting workshop series, and for opening the path to the next decade of RFIDsec. July 2015 Stefan Mangard Patrick Schaumont Organization Program Committee Frederik Armknecht Universit¨at Mannheim, Germany Gildas Avoine INSA Rennes, France and UCL, Belgium Lejla Batina Radboud University Nijmegen, The Netherlands Srdjan Capkun ETH Zurich, Switzerland Rajat Subhra Chakraborty IIT Kharagpur, India Thomas Eisenbarth Worcester Polytechnic Institute, USA Martin Feldhofer NXP Semiconductors, Germany Aur´elien Francillon Eurecom, France Gerhard Hancke City University of Hong Kong, SAR China Julio Hernandez Kent University, UK Daniel E. Holcomb University of Michigan, USA Michael Hutter Cryptography Research Inc., USA Stefan Mangard TU Graz, Austria Daisuke Moriyama NICT, Japan Christof Paar Ruhr University Bochum, Germany and University of Massachusetts, USA Axel Poschmann NXP Semiconductors, Germany Bart Preneel KU Leuven, Belgium Matt Robshaw Impinj, USA Kazuo Sakiyama The University of Electro-Communications, Japan Nitesh Saxena University of Alabama at Birmingham, USA Patrick Schaumont Virginia Tech, USA Erich Wenger TU Graz, Austria Avishai Wool Tel Aviv University, Israel Additional Reviewers Becker, Georg T. Herbst, Christoph Bilgin, Begu¨l Hermans, Jens Boehl, Florian Hiller, Matthias Budhathoki, Parshuram Joye, Marc Chen, Cong Komano, Yuichi Chmielewski, Lukasz Korak, Thomas Delvaux, Jeroen Krasnova, Anna Forte, Domenic Lamberger, Mario Gross, Hannes Li, Yang VIII Organization Mohamed, Manar Schl¨osser, Alexander Mukhopadhyay, Dibya Shirvanian, Maiheh Nikova, Svetla Shrestha, Babins Phuong Ha, Nguyen Taha, Mostafa Saha, Sayandeep Wang, Chao Sahoo, Durga Prasad Yamamoto, Dai Contents PUFs and Applications Security Evaluation and Enhancement of Bistable Ring PUFs ......... 3 Xiaolin Xu, Ulrich Ru¨hrmair, Daniel E. Holcomb, and Wayne Burleson On the Scaling of Machine Learning Attacks on PUFs with Application to Noise Bifurcation.............................................. 17 Johannes Tobisch and Georg T. Becker ReSC: RFID-Enabled Supply Chain Management and Traceability for Network Devices ................................................. 32 Kun Yang, Domenic Forte, and Mark Tehranipoor Side-Channels and Countermeasures Side-Channel Assisted Modeling Attacks on Feed-Forward Arbiter PUFs Using Silicon Data.......................................... 53 Raghavan Kumar and Wayne Burleson SharingisCaring—OntheProtectionofArithmeticLogicUnitsagainst Passive Physical Attacks.......................................... 68 Hannes Gross RFID System Attacks Practical Experiences on NFC Relay Attacks with Android: Virtual Pickpocketing Revisited.................................... 87 Jos´e Vila and Ricardo J. Rodr´ıguez Algebraic Cryptanalysis and RFID Authentication ................... 104 Carlos Cid, Loic Ferreira, Gordon Procter, and Matt J.B. Robshaw An RFID Skimming Gate Using Higher Harmonics................... 122 Ren´e Habraken, Peter Dolron, Erik Poll, and Joeri de Ruiter Efficient Implementations Efficient E-cash with Attributes on MULTOS Smartcards ............. 141 Gesine Hinterw¨alder, Felix Riek, and Christof Paar

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.