Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
Michael RolandPublished in: CoRR (2012)
Keyphrases
- attack scenarios
- real world
- attack detection
- alert correlation
- attack graphs
- security measures
- intrusion detection system
- intrusion detection
- attack graph
- countermeasures
- multistage
- anomaly detection
- lightweight
- information security
- personal information
- key management
- cloud computing
- dynamic programming
- social media
- neural network