Low-level attacks in bitcoin wallets

A Gkaniatsou, M Arapinis, A Kiayias - … Conference, ISC 2017, Ho Chi Minh …, 2017 - Springer
As with every financially oriented protocol, there has been a great interest in studying,
verifying, attacking, identifying problems, and proposing solutions for Bitcoin. Within that …

[图书][B] Smart Card Security: Applications, Attacks, and Countermeasures

BB Gupta, M Quamara - 2019 - taylorfrancis.com
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of
smart card technology and explores different security attacks and countermeasures …

[HTML][HTML] Chip chop—smashing the mobile phone secure chip for fun and digital forensics

G Alendal, S Axelsson, GO Dyrkolbotn - Forensic Science International …, 2021 - Elsevier
Performing mobile phone acquisition today requires breaking—often hardware assisted—
security. In recent years, Embedded Secure Element (eSE) hardware has been introduced …

Usability and security analysis of the keepkey wallet

E Almutairi, S Al-Megren - 2019 IEEE International Conference …, 2019 - ieeexplore.ieee.org
This paper presents an investigation of the usability and security of the hardware wallet
KeepKey 4.2. 10. A Man-in-the-Middle (MITM) attack was implemented to simulate potential …

APDU-Level Attacks in PKCS#11 Devices

C Bozzato, R Focardi, F Palmarini, G Steel - International Symposium on …, 2016 - Springer
In this paper we describe attacks on PKCS# 11 devices that we successfully mounted by
interacting with the low-level APDU protocol, used to communicate with the device. They …

康复设备数据通讯与存储的标准化研究

张杰, 严壮志, 蒋皆恢 - 中国医疗器械杂志, 2016 - zgylqxzz.xml-journal.net
随着康复需求的日益增长, 整合康复资源, 实现数据共享是完善康复一体化以及提高康复诊疗
效率的关键, 也是三级医疗康复网络构建中遇到的重要难题. 基于现有医疗设备标准及医疗数据 …

The History of the DReaM Group

A Bundy - Mathematical Reasoning: The History and Impact of the …, 2021 - Springer
I describe the history of the DReaM Group (Discovery and Reasoning in Mathematics),
which I created after my arrival at the University of Edinburgh in 1971. The group has been …

[PDF][PDF] SAFEST: Secure Actions for FTP Environment with Smart Token

TS Sobh, AH Khalil - Proceedings of 32nd International Conference …, 2019 - easychair.org
Nowadays, with the wide applications of distributed systems, web-based applications, and
communications systems over the Internet for carrying data between users such as terminal …

Analysis of threats and design flaws in hardware and software cryptographic systems

F Palmarini - 2019 - dspace.unive.it
In the past two decades the use of cryptography in computer systems has constantly
increased. Ranging from personal devices to critical infrastructures, cryptography is …

Analysis of low-level implementations of cryptographic protocols

AE Gkaniatsou - 2018 - era.ed.ac.uk
This thesis examines the vulnerabilities due to low-level implementation deficiencies of
otherwise secure communication protocols in smart-cards. Smart-cards are considered to be …