• Publications
  • Influence
CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus
TLDR
We investigate the problems associated with implementing a backward compatible message authentication protocol on the CAN bus. Expand
  • 184
  • 14
  • PDF
Location verification using secure distance bounding protocols
TLDR
We show how to modify the distance bounding protocol to make it resistant to terrorist fraud attacks. Expand
  • 175
  • 13
  • PDF
Distance Bounding in Noisy Environments
TLDR
We present an improved distance bounding protocol for noisy channels that offers a substantial reduction (about 50%) in the number of communication rounds compared to the Hancke and Kuhn protocol. Expand
  • 127
  • 8
  • PDF
Low-cost untraceable authentication protocols for RFID
TLDR
We repair three revised EC-RAC protocols of Lee, Batina and Verbauwhede and show that two of the improved authentication protocols are wide-strong privacy-preserving and one wide-weak privacy-Preserving; we present the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties. Expand
  • 101
  • 5
  • PDF
Privacy-Preserving ECC-Based Grouping Proofs for RFID
TLDR
We propose a privacy-preserving RFID grouping proof and demonstrate that it can easily be extended to use cases with more than two tags. Expand
  • 25
  • 5
  • PDF
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning
TLDR
This paper proposes and analyses a novel methodology to fingerprint LoRa devices, which is inspired by recent advances in supervised machine learning and zero-shot image classification. Expand
  • 36
  • 3
  • PDF
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
TLDR
We extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC). Expand
  • 42
  • 3
  • PDF
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them
TLDR
We fully reverse-engineer the proprietary communication protocol between a device programmer and the latest generation of a widely used Implantable Cardioverter Defibrillator (ICD) which communicate over a long-range RF channel (from two to five meters). Expand
  • 38
  • 3
  • PDF
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
TLDR
We propose a new, hybrid digital-analog design that enables the implementation of Terrorist Fraud resilient distance bounding protocols. Expand
  • 38
  • 2
  • PDF
On the Feasibility of Cryptography for a Wireless Insulin Pump System
TLDR
This paper analyses the security and privacy properties of a widely used insulin pump and its peripherals. Expand
  • 26
  • 2
  • PDF