This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n16http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n20http://purl.org/net/nknouf/ns/bibtex#
n13http://localhost/temp/predkladatel/
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n11http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n17http://linked.opendata.cz/resource/domain/vavai/subjekt/
n6http://linked.opendata.cz/ontology/domain/vavai/
n23http://linked.opendata.cz/resource/domain/vavai/zamer/
n5https://schema.org/
shttp://schema.org/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/
skoshttp://www.w3.org/2004/02/skos/core#
n19http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F13%3APU107070%21RIV14-MSM-26230___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n8http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n14http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n21http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n22http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n15http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F13%3APU107070%21RIV14-MSM-26230___
rdf:type
n6:Vysledek skos:Concept
dcterms:description
We present a method of automated vulnerability finding in protocols that use contactless smart cards. We focus on smart cards with contactless interface because they are simpler than their counterparts with contact interface and provide less functionality, which can be modeled more easily. Our method uses model checking to find possible attacks in a model of the protocol implementation on particular smart card. There is a possibility to model arbitrary smart card, we demonstrate this method on one of the currently most widespread contactless smart cards - the Mifare DESFire. Using our method we were able to locate a couple of weaknesses of this smart card which may cause vulnerability if the protocol is not implemented properly. This method can be used by developers to evaluate security of their protocol implementation on particular smart card. We present a method of automated vulnerability finding in protocols that use contactless smart cards. We focus on smart cards with contactless interface because they are simpler than their counterparts with contact interface and provide less functionality, which can be modeled more easily. Our method uses model checking to find possible attacks in a model of the protocol implementation on particular smart card. There is a possibility to model arbitrary smart card, we demonstrate this method on one of the currently most widespread contactless smart cards - the Mifare DESFire. Using our method we were able to locate a couple of weaknesses of this smart card which may cause vulnerability if the protocol is not implemented properly. This method can be used by developers to evaluate security of their protocol implementation on particular smart card.
dcterms:title
Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding
skos:prefLabel
Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding
skos:notation
RIV/00216305:26230/13:PU107070!RIV14-MSM-26230___
n6:predkladatel
n17:orjk%3A26230
n7:aktivita
n12:S n12:P n12:Z
n7:aktivity
P(ED1.1.00/02.0070), S, Z(MSM0021630528)
n7:dodaniDat
n15:2014
n7:domaciTvurceVysledku
n11:2034867 n11:8557896
n7:druhVysledku
n22:D
n7:duvernostUdaju
n14:S
n7:entitaPredkladatele
n19:predkladatel
n7:idSjednocenehoVysledku
88859
n7:idVysledku
RIV/00216305:26230/13:PU107070
n7:jazykVysledku
n21:eng
n7:klicovaSlova
contactless smart card, security, vulnerability, model, Mifare DESFire
n7:klicoveSlovo
n8:contactless%20smart%20card n8:vulnerability n8:model n8:security n8:Mifare%20DESFire
n7:kontrolniKodProRIV
[30580DE123D6]
n7:mistoKonaniAkce
Chengdu
n7:mistoVydani
Chengdu
n7:nazevZdroje
2013 International Symposium on Biometrics and Security Technologies (ISBAST)
n7:obor
n9:IN
n7:pocetDomacichTvurcuVysledku
2
n7:pocetTvurcuVysledku
2
n7:projekt
n18:ED1.1.00%2F02.0070
n7:rokUplatneniVysledku
n15:2013
n7:tvurceVysledku
Henzl, Martin Hanáček, Petr
n7:typAkce
n16:WRD
n7:zahajeniAkce
2013-07-02+02:00
n7:zamer
n23:MSM0021630528
s:numberOfPages
8
n20:hasPublisher
IEEE Computer Society
n5:isbn
978-0-7695-5010-7
n13:organizacniJednotka
26230