{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:07:07Z","timestamp":1725703627360},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642342097"},{"type":"electronic","value":"9783642342103"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34210-3_1","type":"book-chapter","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T14:24:57Z","timestamp":1349792697000},"page":"1-16","source":"Crossref","is-referenced-by-count":11,"title":["Designed to Fail: A USB-Connected Reader for Online Banking"],"prefix":"10.1007","author":[{"given":"Arjan","family":"Blom","sequence":"first","affiliation":[]},{"given":"Gerhard","family":"de Koning Gans","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Poll","sequence":"additional","affiliation":[]},{"given":"Joeri","family":"de Ruiter","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Verdult","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Aarts, F., Poll, E., de Ruiter, J.: Formal models of bank cards for free. Draft (2012)","DOI":"10.1109\/ICSTW.2013.60"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-28540-0_26","volume-title":"Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance","author":"G. Alp\u00e1r","year":"2012","unstructured":"Alp\u00e1r, G., Batina, L., Verdult, R.: Using NFC Phones for Proving Credentials. In: Schmitt, J.B. (ed.) MMB & DFT 2012. LNCS, vol.\u00a07201, pp. 317\u2013330. Springer, Heidelberg (2012)"},{"key":"1_CR3","unstructured":"Barisani, A., Bianco, D., Laurie, A., Franken, Z.: Chip & PIN is definitely broken. Presentation at CanSecWest Applied Security Conference, Vancouver (2011), More info available at http:\/\/dev.inversepath.com\/download\/emv"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-32946-3_3","volume-title":"Financial Cryptography and Data Security","author":"J. Bonneau","year":"2012","unstructured":"Bonneau, J., Preibusch, S., Anderson, R.: A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol.\u00a07397, pp. 25\u201340. Springer, Heidelberg (2012)"},{"key":"1_CR5","unstructured":"Check-In-Phone \u2013 Technology and Security, http:\/\/upload.rb.ru\/upload\/users\/files\/3374\/check-in-phone-technologie_security-english-_2010-08-12_20.05.11.pdf"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"de Koning Gans, G., de Ruiter, J.: The smartlogic tool: Analysing and testing smart card protocols. In: IEEE Fifth International Conference on Software Testing, Verification, and Validation, pp. 864\u2013871 (2012)","DOI":"10.1109\/ICST.2012.189"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-27375-9_7","volume-title":"Theory of Security and Applications","author":"J. Ruiter de","year":"2012","unstructured":"de Ruiter, J., Poll, E.: Formal Analysis of the EMV Protocol Suite. In: M\u00f6dersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol.\u00a06993, pp. 113\u2013129. Springer, Heidelberg (2012)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-03549-4_11","volume-title":"Financial Cryptography and Data Security","author":"S. Drimer","year":"2009","unstructured":"Drimer, S., Murdoch, S.J., Anderson, R.: Optimised to Fail: Card Readers for Online Banking. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 184\u2013200. Springer, Heidelberg (2009)"},{"key":"1_CR9","unstructured":"EMVCo. EMV\u2013 Integrated Circuit Card Specifications for Payment Systems, Book 1-4 (2008), http:\/\/emvco.com"},{"key":"1_CR10","unstructured":"CEN Workshop Agreement (CWA) 14174: Financial transactional IC card reader (FINREAD) (2004)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Gullberg, P.: Method and device for creating a digital signature. European Patent Application EP 2 166 483 A1, filed September 17, 2008 (March 24, 2010)","DOI":"10.1177\/193371912010173s003"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is Broken. In: Symposium on Security and Privacy, pp. 433\u2013446. IEEE (2010)","DOI":"10.1109\/SP.2010.33"},{"key":"1_CR13","unstructured":"Ortiz-Yepes, D.A.: Nfc-cap security assessment. Technical report, IBM Zurich Research Laboratory (2009)"},{"issue":"9","key":"1_CR14","first-page":"176","volume":"8","author":"Z. Saleh","year":"2010","unstructured":"Saleh, Z., Alsmadi, I.: Using RFID to enhance mobile banking security. International Journal of Computer Science and Information Security (IJCSIS)\u00a08(9), 176\u2013182 (2010)","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"1_CR15","first-page":"50","volume":"56","author":"J.-P. Szikora","year":"2011","unstructured":"Szikora, J.-P., Teuwen, P.: Banques en ligne: \u00e0 la d\u00e9couverte d\u2019EMV-CAP. MISC (Multi-System & Internet Security Cookbook)\u00a056, 50\u201362 (2011)","journal-title":"MISC (Multi-System & Internet Security Cookbook)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-78917-8_1","volume-title":"Formal Methods and Testing","author":"J. Tretmans","year":"2008","unstructured":"Tretmans, J.: Model Based Testing with Labelled Transition Systems. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) FORTEST. LNCS, vol.\u00a04949, pp. 1\u201338. Springer, Heidelberg (2008)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Weigold, T., Hiltgen, A.: Secure confirmation of sensitive transaction data in modern internet banking services. In: 2011 World Congress on Internet Security (WorldCIS), pp. 125\u2013132. IEEE (2011)","DOI":"10.1109\/WorldCIS17046.2011.5749897"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Weigold, T., Kramp, T., Hermann, R., H\u00f6ring, F., Buhler, P., Baentsch, M.: The Zurich Trusted Information Channel\u2013an efficient defence against man-in-the-middle and malicious software attacks. In: Trusted Computing-Challenges and Applications, pp. 75\u201391 (2008)","DOI":"10.1007\/978-3-540-68979-9_6"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34210-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T04:49:00Z","timestamp":1687754940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34210-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642342097","9783642342103"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34210-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}