Roel Verdult - Publications Publications of Roel Verdult

Doctoral Dissertation

The (in)security of proprietary cryptography The (in)security of proprietary cryptography The (in)security of proprietary cryptography
Digital Security group, Institute for Computing and Information Sciences, Radboud University, The Netherlands.
Computer Security and Industrial Cryptography, Electrical Engineering Department, KU Leuven, Belgium.

Journals

Wirelessly Lockpicking a Smart Card Reader Wirelessly Lockpicking a Smart Card Reader Wirelessly Lockpicking a Smart Card Reader
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult
International Journal of Information Security (IJIS)
Berlin / Heidelberg, volume 13, number 5, pages 403-420. Springer-Verlag, 2014.

Conferences and Workshops

PIE: Parser Identification in Embedded Systems PIE: Parser Identification in Embedded Systems PIE: Parser Identification in Embedded Systems
Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti
31st Annual Computer Security Applications Conference (ACSAC 2015)
Los Angeles CA, USA. ACM, 2015.

Defeating IMSI Catchers Defeating IMSI Catchers Defeating IMSI Catchers
Fabian van den Broek, Roel Verdult, Joeri de Ruiter
22nd ACM Conference on Computer and Communications Security (CCS 2015)
Denver CO, USA, pages 340-351. ACM, 2015.

Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
Carlo Meijer, Roel Verdult
22nd ACM Conference on Computer and Communications Security (CCS 2015)
Denver CO, USA, pages 18-30. ACM, 2015.

Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer ( Special Paper Presentation )
Roel Verdult, Flavio D. Garcia, Bariş Ege
22nd USENIX Security Symposium (USENIX Security 2013)
Washington DC, USA, pages 703-718. USENIX Association, 2015.

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers ( Best Student Paper Award )
Eduardo Novella Lorente, Carlo Meijer, and Roel Verdult
9th USENIX Workshop on Offensive Technologies (WOOT 2015)
Washington DC, USA. USENIX Association, 2015.

Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials
Willem Burgers, Roel Verdult, Marko van Eekelen
18th Nordic Conference on Secure IT Systems (NordSec 2013)
Ilulissat, Greenland, volume 8208 of Lecture Notes in Computer Science, pages 33-50. Springer-Verlag, 2013.

Designed to Fail: A USB-Connected Reader for Online Banking Designed to Fail: A USB-Connected Reader for Online Banking Designed to Fail: A USB-Connected Reader for Online Banking
Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012)
Karlskrona, Sweden, volume 7617 of Lecture Notes in Computer Science, pages 1-16. Springer-Verlag, 2012.

A Toolbox for RFID Protocol Analysis A Toolbox for RFID Protocol Analysis A Toolbox for RFID Protocol Analysis
Roel Verdult, Flavio D. Garcia, Gerhard de Koning Gans
4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012)
Torino, Italy, pages 27-34. IEEE Computer Society, 2012.

Dismantling iClass and iClass Elite Dismantling iClass and iClass Elite Dismantling iClass and iClass Elite
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac
17th European Symposium on Research in Computer Security (ESORICS 2012)
Pisa, Italy, volume 7459 of Lecture Notes in Computer Science, pages 697-715. Springer-Verlag, 2012.

Gone in 360 Seconds: Hijacking with Hitag2 Gone in 360 Seconds: Hijacking with Hitag2 Gone in 360 Seconds: Hijacking with Hitag2
Roel Verdult, Flavio D. Garcia, Josep Balasch
21st USENIX Security Symposium (USENIX Security 2012)
Bellevue WA, USA, pages 237-252. USENIX Association, 2012.

Using NFC Phones for Proving Credentials Using NFC Phones for Proving Credentials Using NFC Phones for Proving Credentials
Gergely Alpár, Lejla Batina, Roel Verdult
16th Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance (MMB&DFT 2012)
Kaiserslautern, Germany, volume 7201 of Lecture Notes in Computer Science, pages 317-330. Springer-Verlag, 2012.

Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs
Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
12th Cryptographers' Track at the RSA Conference (CT-RSA 2012)
San Francisco CA, USA, volume 7178 of Lecture Notes in Computer Science, pages 19-34. Springer-Verlag, 2012.

Exposing iClass Key Diversification Exposing iClass Key Diversification Exposing iClass Key Diversification ( Best Paper Award )
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult
5th USENIX Workshop on Offensive Technologies (WOOT 2011)
San Francisco CA, USA, pages 128-136. USENIX Association, 2011.

Practical Attacks on NFC Enabled Cell Phones Practical Attacks on NFC Enabled Cell Phones Practical Attacks on NFC Enabled Cell Phones
Roel Verdult, François Kooman
3rd International Workshop on Near Field Communication (NFC 2011)
Hagenberg, Austria, pages 77-82. IEEE Computer Society, 2011.

Dismantling SecureMemory, CryptoMemory and CryptoRF Dismantling SecureMemory, CryptoMemory and CryptoRF Dismantling SecureMemory, CryptoMemory and CryptoRF
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
17th ACM Conference on Computer and Communications Security (CCS 2010)
Chicago IL, USA, pages 250-259. ACM, 2010.

Wirelessly Pickpocketing a MIFARE Classic Card Wirelessly Pickpocketing a MIFARE Classic Card Wirelessly Pickpocketing a MIFARE Classic Card ( Outstanding Paper Award )
Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur
30th IEEE Symposium on Security and Privacy (S&P 2009)
Oakland CA, USA, pages 3-15. IEEE Computer Society, 2009.

Dismantling MIFARE Classic Dismantling MIFARE Classic Dismantling MIFARE Classic
Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter Van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs
13th European Symposium on Research in Computer Security (ESORICS 2008)
Málaga, Spain, volume 5283 of Lecture Notes in Computer Science, pages 97-114. Springer-Verlag, 2008.

Manuscripts

Introduction to Cryptanalysis: Attacking Stream Ciphers Introduction to Cryptanalysis: Attacking Stream Ciphers Introduction to Cryptanalysis: Attacking Stream Ciphers
Roel Verdult
Manuscript, Radboud University Nijmegen, 2015.

Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult
Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012)
Technical Report, Radboud University Nijmegen, 2012.

Security Analysis of RFID Tags Security Analysis of RFID Tags Security Analysis of RFID Tags
Roel Verdult
Master's thesis, Radboud University Nijmegen, The Netherlands, July, 2008.

Security Flaw in MIFARE Classic Security Flaw in MIFARE Classic Security Flaw in MIFARE Classic
Ronny Wichers Schreur, Peter van Rossum, Flavio Garcia, Wouter Teepe, Jaap-Henk Hoepman, Bart Jacobs,
Gerhard de Koning Gans, Roel Verdult, Ruben Muijrers, Ravindra Kali, Vinesh Kali
Press release, Digital Security group, Radboud University Nijmegen, The Netherlands, March 12, 2008.

Proof of Concept, Cloning the OV-chip Card Proof of Concept, Cloning the OV-chip Card Proof of Concept, Cloning the OV-chip Card
Roel Verdult
Technical Report, Radboud University Nijmegen, The Netherlands, January, 2008.

Posters

Poster: Prevent Session Hijacking Poster: Prevent Session Hijacking
Willem Burgers, Roel Verdult, Marko van Eekelen

The truth about ABN-AMRO’s e.dentifier2 The truth about ABN-AMRO’s e.dentifier2
Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult
poster at ICT.OPEN 2012, organized by ICTDelta

Poster: Gone in 360 Seconds: Hijacking with Hitag2 Poster: Gone in 360 Seconds: Hijacking with Hitag2
Roel Verdult, Flavio D. Garcia, Josep Balasch
poster at ICT.OPEN 2012, organized by ICTDelta

Poster: Dismantling iClass and iClass Elite Poster: Dismantling iClass and iClass Elite
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac
Poster at 21st USENIX Security Symposium (USENIX Security 2012)

Talks

Do you trust the cryptography used in your devices? Do you trust the cryptography used in your devices?
Roel Verdult
COSIC Seminar, 17th April 2014

Security Taken for Granted Security Taken for Granted
Roel Verdult
6th Bits&Chips Hardware Conference (BNC 2013)

RFID Security Taken for Granted RFID Security Taken for Granted
Roel Verdult
10th Black Hat Sessions (BHS 2012)

NFC Malicious Content Sharing NFC Malicious Content Sharing
Roel Verdult, François Kooman
2nd BruCON Security Conference (BruCON 2010)

Mifare or Freefare Mifare or Freefare
Roel Verdult
4th SNiC Conference - Securiosity Symposium (SNiC 2009)

Classic Mistakes Classic Mistakes
Roel Verdult
6th Dutch Hacker Conference - Hacking at Random (HAR 2009)