关注
Roel Verdult
Roel Verdult
FactorIT BV
在 factorit.nl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Dismantling MIFARE Classic
FD Garcia, G de Koning Gans, R Muijrers, P Van Rossum, R Verdult, ...
13th European Symposium on Research in Computer Security (ESORICS 2008), 97-114, 2008
3482008
Wirelessly Pickpocketing a MIFARE Classic Card
FD Garcia, P Rossum, R Verdult, R Wichers Schreur
30th IEEE Symposium on Security and Privacy (S&P 2009), 3-15, 2009
2142009
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
R Verdult, FD Garcia, B Ege
22nd USENIX Security Symposium (USENIX Security 2013), 2013
1632013
Gone in 360 seconds: Hijacking with Hitag2
R Verdult, FD Garcia, J Balasch
21st USENIX Security Symposium (USENIX Security 2012), 237-252, 2012
1582012
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
22nd ACM Conference on Computer and Communications Security (CCS 2015), 340-351, 2015
1052015
Practical Attacks on NFC Enabled Cell Phones
R Verdult, F Kooman
3rd International Workshop on Near Field Communication (NFC 2011), 77-82, 2011
962011
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
12th Cryptographers' Track at the RSA Conference (CT-RSA 2012), 19-34, 2012
862012
PIE: Parser identification in embedded systems
L Cojocar, J Zaddach, R Verdult, H Bos, A Francillon, D Balzarotti
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
472015
Dismantling SecureMemory, CryptoMemory and CryptoRF
FD Garcia, P van Rossum, R Verdult, R Wichers Schreur
17th ACM Conference on Computer and Communications Security (CCS 2010), 250-259, 2010
452010
Dismantling iClass and iClass Elite
FD Garcia, G de Koning Gans, R Verdult, M Meriac
17th European Symposium on Research in Computer Security (ESORICS 2012), 697-715, 2012
402012
Using NFC Phones for Proving Credentials
G Alpár, L Batina, R Verdult
16th Measurement, Modelling, and Evaluation of Computing Systems and De …, 2012
382012
Designed to Fail: A USB-Connected Reader for Online Banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), 1-16, 2012
342012
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
C Meijer, R Verdult
22nd ACM Conference on Computer and Communications Security (CCS 2015), 18-30, 2015
322015
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
EN Lorente, C Meijer, R Verdult
9th USENIX Workshop on Offensive Technologies (WOOT 2015), 2015
322015
Proof of Concept, Cloning the OV-chip Card
R Verdult
Technical report, Radboud University Nijmegen, 2008
312008
The (in)security of proprietary cryptography
R Verdult
Radboud University and KU Leuven, 2015
302015
Security Analysis of RFID Tags
R Verdult
Radboud University Nijmegen, 2008
292008
A Toolbox for RFID Protocol Analysis
R Verdult, G de Koning Gans, FD Garcia
4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012), 2012
282012
Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research
FD Garcia, G de Koning Gans, R Verdult
Technical report, Radboud University Nijmegen, 2012
262012
Exposing iClass Key Diversification
FD Garcia, G de Koning Gans, R Verdult
5th USENIX Workshop on Offensive Technologies (WOOT 2011), 128-136, 2011
262011
系统目前无法执行此操作,请稍后再试。
文章 1–20