Roel Verdult

According to our database1, Roel Verdult authored at least 19 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

2015
The (In)security of Proprietary Cryptography ; De (on)veiligheid van propriëtaire cryptografie.
PhD thesis, 2015

Cryptanalysis of the Megamos Crypto Automotive Immobilizer.
login Usenix Mag., 2015

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Defeating IMSI Catchers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

PIE: Parser Identification in Embedded Systems.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Wirelessly lockpicking a smart card reader.
Int. J. Inf. Sec., 2014

2013
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

2012
Gone in 360 Seconds: Hijacking with Hitag2.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Designed to Fail: A USB-Connected Reader for Online Banking.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Using NFC Phones for Proving Credentials.
Proceedings of the Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance, 2012

Dismantling iClass and iClass Elite.
Proceedings of the Computer Security - ESORICS 2012, 2012

Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Exposing iClass Key Diversification.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

2010
Dismantling SecureMemory, CryptoMemory and CryptoRF.
IACR Cryptol. ePrint Arch., 2010

2009
Wirelessly Pickpocketing a Mifare Classic Card.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Dismantling MIFARE Classic.
Proceedings of the Computer Security, 2008


  Loading...