Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of distance bounding protocols in this 23-minute conference talk from USENIX Security '18. Delve into an extended applied pi-calculus model designed specifically for these protocols, and discover how various security properties can be encoded and ranked. Examine the relationship between security properties and attacker models, including a newly identified property called "uncompromised distance bounding." Learn about the compilation process that enables automatic protocol verification using the ProVerif tool, and see its application in analyzing real-world distance bounding protocols from MasterCard and NXP. Gain valuable insights into the security of contactless payment cards and car entry systems through this in-depth presentation by Tom Chothia from the University of Birmingham.

Syllabus

USENIX Security '18 - Modelling and Analysis of a Hierarchy of Distance Bounding Attacks

Taught by

USENIX

Reviews

Start your review of Modelling and Analysis of a Hierarchy of Distance Bounding Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.