Search For:

Displaying 1-4 out of 4 total
API-Level Attacks on Embedded Systems
Found in: Computer
By Mike Bond, Ross Anderson
Issue Date:October 2001
pp. 67-75
<p>A growing number of embedded systems use security processors to distribute control, billing, and metering among devices with intermittent or restricted online connectivity. The more obvious examples include smart cards, microcontrollers used as va...
How Certification Systems Fail: Lessons from the Ware Report
Found in: IEEE Security & Privacy
By Steven J. Murdoch,Mike Bond,Ross Anderson
Issue Date:November 2012
pp. 40-44
The 1970 Security Controls for Computer Systems report, which helped shape computer systems' standard evaluation criteria, can shed light on current certification systems' shortcomings.
Chip and PIN is Broken
Found in: Security and Privacy, IEEE Symposium on
By Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond
Issue Date:May 2010
pp. 433-446
EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Europe; it is being introduced in Canada; and there is pressure from banks to introduc...
A pact with the devil
Found in: Proceedings of the 2006 workshop on New security paradigms (NSPW '06)
By George Danezis, Mike Bond
Issue Date:September 2006
pp. 77-82
We study malware propagation strategies which exploit not the incompetence or naivety of users, but instead their own greed, malice and short-sightedness. We demonstrate that interactive propagation strategies, for example bribery and blackmail of computer...