Reverse-Engineering a Cryptographic RFID Tag.
Karsten NohlDavid Evans StarbugHenryk PlötzPublished in: USENIX Security Symposium (2008)
Keyphrases
- reverse engineering
- rfid tags
- security protocols
- smart card
- low cost
- radio frequency identification
- software engineering
- lightweight
- rfid reader
- rfid systems
- software maintenance
- public key
- dynamic analysis
- object oriented
- resource constrained
- security mechanisms
- gene regulatory networks
- authentication protocol
- digital signature
- radio frequency identification rfid
- program understanding
- reverse engineer
- legacy systems
- security issues
- business rules
- rfid technology
- secret key
- conceptual schema
- cost effective
- power consumption
- encryption scheme
- real time
- information security
- hash functions
- wireless networks
- security requirements
- mobile phone
- artificial intelligence
- databases
- database