• Publications
  • Influence
Information hiding-a survey
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptibleExpand
  • 2,545
  • 85
Open Access
An RFID Distance Bounding Protocol
  • G. Hancke, M. Kuhn
  • Computer Science
  • First International Conference on Security and…
  • 5 September 2005
Radio-frequency identification tokens, such as contactless smartcards, are vulnerable to relay attacks if they are used for proximity authentication. Attackers can circumvent the limited range of theExpand
  • 512
  • 70
Open Access
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe someExpand
  • 978
  • 53
Open Access
Tamper resistance: a cautionary note
An increasing number of systems from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems -- someExpand
  • 1,124
  • 36
Open Access
Design Principles for Tamper-Resistant Smartcard Processors
We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and powerExpand
  • 650
  • 28
Open Access
Low Cost Attacks on Tamper Resistant Devices
There has been considerable recent interest in the level of tamper resistance that can be provided by low cost devices such as smart-cards. It is known that such devices can be reverse engineeredExpand
  • 744
  • 22
Open Access
Compromising emanations: eavesdropping risks of computer displays
Electronic equipment can emit unintentional signals from which eavesdroppers may reconstruct processed data at some distance. This has been a concern for military hardware for over half a century.Expand
  • 224
  • 20
Open Access
Analysis of a denial of service attack on TCP
The paper analyzes a network based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many TCP (TransmissionExpand
  • 507
  • 16
Open Access
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control the electromagneticExpand
  • 274
  • 15
Open Access
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protocols of Hu, PerrigExpand
  • 154
  • 13
Open Access