CS Store Search
Displaying 1-4 out of 4 total
API-Level Attacks on Embedded Systems
By Mike Bond, Ross Anderson
Issue Date:October 2001
<p>A growing number of embedded systems use security processors to distribute control, billing, and metering among devices with intermittent or restricted online connectivity. The more obvious examples include smart cards, microcontrollers used as va...
How Certification Systems Fail: Lessons from the Ware Report
IEEE Security & Privacy
By Steven J. Murdoch,Mike Bond,Ross Anderson
Issue Date:November 2012
The 1970 Security Controls for Computer Systems report, which helped shape computer systems' standard evaluation criteria, can shed light on current certification systems' shortcomings.
Chip and PIN is Broken
Security and Privacy, IEEE Symposium on
By Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond
Issue Date:May 2010
EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Europe; it is being introduced in Canada; and there is pressure from banks to introduc...
A pact with the devil
Found in: Proceedings of the 2006 workshop on New security paradigms (NSPW '06)
By George Danezis, Mike Bond
Issue Date:September 2006
We study malware propagation strategies which exploit not the incompetence or naivety of users, but instead their own greed, malice and short-sightedness. We demonstrate that interactive propagation strategies, for example bribery and blackmail of computer...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.