Soumettre la recherche
Mettre en ligne
ePassport reloaded goes mobile
•
3 j'aime
•
1,260 vues
J
Jeroen van Beek
Suivre
My BlackHat Europe 2009 slides about ePassport (in)security.
Lire moins
Lire la suite
Business
Technologie
Signaler
Partager
Signaler
Partager
1 sur 41
Recommandé
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
An Online secure ePassport Protocol
An Online secure ePassport Protocol
Vijay Pasupathinathan, PhD
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
Tariq Tauheed
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
Rima Hajou
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
The Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
Recommandé
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
An Online secure ePassport Protocol
An Online secure ePassport Protocol
Vijay Pasupathinathan, PhD
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
Tariq Tauheed
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
Rima Hajou
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
The Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
Introduction to cryptography
Introduction to cryptography
Amir Neziri
Electronic credentials
Electronic credentials
Amir Neziri
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
Session 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
Two-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Information Security Awareness Group
Make the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
Smartcard
Smartcard
aashish2cool4u
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
Contenu connexe
Tendances
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
Introduction to cryptography
Introduction to cryptography
Amir Neziri
Electronic credentials
Electronic credentials
Amir Neziri
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
Session 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
Two-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Information Security Awareness Group
Tendances
(13)
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Introduction to cryptography
Introduction to cryptography
Electronic credentials
Electronic credentials
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Session 7 e_raja_kailar
Session 7 e_raja_kailar
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
A Security Framework in RFID
A Security Framework in RFID
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Two-factor Authentication
Two-factor Authentication
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Similaire à ePassport reloaded goes mobile
Make the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
Smartcard
Smartcard
aashish2cool4u
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Faheem Nadeem
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Jason Shen
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
Pierre-Jean Verrando
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
DroneSec
Rebooting the smartcard
Rebooting the smartcard
Eric Larcheveque
Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
Mobile security
Mobile security
Stefaan
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
ClubHack
IOT Forensics
IOT Forensics
MuhammadAwaisQureshi6
Ict project (1)
Ict project (1)
spy007s
Similaire à ePassport reloaded goes mobile
(20)
Make the Smartcard great again
Make the Smartcard great again
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Smartcard
Smartcard
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
Rebooting the smartcard
Rebooting the smartcard
Module 7 (sniffers)
Module 7 (sniffers)
Mobile security
Mobile security
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
IOT Forensics
IOT Forensics
Ict project (1)
Ict project (1)
Dernier
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Dipal Arora
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
Michael W. Hawkins
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
Any kyc Account
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
NZSG
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
Roland Driesen
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Lviv Startup Club
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Delhi Call girls
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
lizamodels9
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
Roland Driesen
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
seri bangash
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
anilsa9823
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
rwgiffor
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
tbatkhuu1
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Dave Litwiller
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Aggregage
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
Dernier
(20)
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
ePassport reloaded goes mobile
1.
ePassports reloaded goes
mobile Jeroen van Beek BlackHat Europe 2009, Amsterdam
2.
3.
4.
Technology overview, ct.
5.
Technology overview, ct.
doors RFID reader and optical scanner camera
6.
7.
8.
9.
10.
11.
“ Employee Amsterdam
Airport steals blank passports” Passports were part of diplomatic mail.
12.
Path of attack
step 1, ct. + = +
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Passive Authentication =
=
23.
24.
Finding new flaws,
ct. +
25.
26.
Clone with your
phone = + + +
27.
28.
29.
30.
31.
32.
33.
34.
35.
In 2002, 1.200
blank Dutch IDs were stolen. The printing company SDU did not officially report the crime(!) until the first documents were seen in the field in 2004…
36.
37.
38.
39.
Questions
40.
Thank you! Contact
details:
41.