Reverse Engineering of Authentication Protocol in DesFire.
Mansoureh LabbafniyaHamed YusefiAkram KhalesiPublished in: ISC Int. J. Inf. Secur. (2023)
Keyphrases
- reverse engineering
- authentication protocol
- smart card
- security analysis
- public key
- software engineering
- dynamic analysis
- lightweight
- gene regulatory networks
- software maintenance
- rfid tags
- secret key
- object oriented
- security protocols
- program understanding
- legacy systems
- hash functions
- reverse engineer
- databases
- data integration
- open source
- knn
- machine learning
- real time