{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:46:35Z","timestamp":1756896395960,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000690","name":"Research Councils UK","doi-asserted-by":"publisher","award":["EP\/G066019\/1"],"award-info":[{"award-number":["EP\/G066019\/1"]}],"id":[{"id":"10.13039\/501100000690","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/K003410\/1"],"award-info":[{"award-number":["EP\/K003410\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660312","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"716-726","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PIN"],"prefix":"10.1145","author":[{"given":"Martin","family":"Emms","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Budi","family":"Arief","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Leo","family":"Freitas","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Joseph","family":"Hannon","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.11"},{"key":"e_1_3_2_1_2_1","volume-title":"Technical Report S.P1229.81.1, Altran Praxis.","author":"Cooper D.","year":"2008","unstructured":"Cooper , D. and Barner , J . 2008 . Tokeneer ID station EAL 5 demonstrator. Technical Report S.P1229.81.1, Altran Praxis. Cooper, D. and Barner, J. 2008. Tokeneer ID station EAL5 demonstrator. Technical Report S.P1229.81.1, Altran Praxis."},{"volume-title":"Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. 16th USENIX Security Symposium","author":"Drimer S.","key":"e_1_3_2_1_3_1","unstructured":"Drimer , S. and Murdoch , S.J . 2007 . Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. 16th USENIX Security Symposium , Boston, MA, USA. http:\/\/www.cl.cam.ac.uk\/~sjm217\/papers\/usenix07bounding.pdf Drimer, S. and Murdoch, S.J. 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. 16th USENIX Security Symposium, Boston, MA, USA. http:\/\/www.cl.cam.ac.uk\/~sjm217\/papers\/usenix07bounding.pdf"},{"key":"e_1_3_2_1_4_1","unstructured":"EMVCo. 2011. EMV Integrated Circuit Card Specifications for Payment Systems -- Version 4.3. http:\/\/www.emvco.com\/specifications.aspx?id=223 {Accessed: 22 August 2014}  EMVCo. 2011. EMV Integrated Circuit Card Specifications for Payment Systems -- Version 4.3. http:\/\/www.emvco.com\/specifications.aspx?id=223 {Accessed: 22 August 2014}"},{"key":"e_1_3_2_1_5_1","unstructured":"EMVCo. 2014. EMV Contactless Specifications for Payment Systems -- Version 2.4. http:\/\/www.emvco.com\/specifications.aspx?id=21 {Accessed: 22 August 2014}  EMVCo. 2014. EMV Contactless Specifications for Payment Systems -- Version 2.4. http:\/\/www.emvco.com\/specifications.aspx?id=21 {Accessed: 22 August 2014}"},{"key":"e_1_3_2_1_6_1","first-page":"21","volume-title":"The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia), Nai-Wei, L., Yingjiu, L. (editors).","volume":"8","author":"Francis L.","year":"2012","unstructured":"Francis , L. , Hancke , G. , Mayes , K. , Markantonakis , K. 2012 . Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones . The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia), Nai-Wei, L., Yingjiu, L. (editors). Vol. 8 , IOS Press (Cryptology and Information Security Series) , pp. 21 -- 32 . http:\/\/eprint.iacr.org\/2011\/618.pdf Francis, L., Hancke, G., Mayes, K., Markantonakis, K. 2012. Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia), Nai-Wei, L., Yingjiu, L. (editors). Vol. 8, IOS Press (Cryptology and Information Security Series), pp. 21--32. http:\/\/eprint.iacr.org\/2011\/618.pdf"},{"key":"e_1_3_2_1_7_1","unstructured":"Freitas L. and Emms M. 2014. Formal specification of EMV protocol. School of Computing Science Technical Report Series 1429 Newcastle University.  Freitas L. and Emms M. 2014. Formal specification of EMV protocol. School of Computing Science Technical Report Series 1429 Newcastle University."},{"key":"e_1_3_2_1_8_1","unstructured":"International Organization for Standardization. 1995. ISO 8583:1995 -- Financial transaction card originated messages -- Interchange message specifications.  International Organization for Standardization. 1995. ISO 8583:1995 -- Financial transaction card originated messages -- Interchange message specifications."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.33"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Reason J. 1990. Human Error. Cambridge University Press.  Reason J. 1990. Human Error. Cambridge University Press.","DOI":"10.1017\/CBO9781139062367"},{"key":"e_1_3_2_1_11_1","first-page":"407","volume-title":"In: Clarke, D., Noble, J., Wrigstad, T. (eds.) Aliasing in Object-Oriented Programming. LNCS","author":"Smans J.","year":"2013","unstructured":"Smans , J. , Jacobs , B. , and Piessens , F . 2013 . VeriFast for Java: A Tutorial. In: Clarke, D., Noble, J., Wrigstad, T. (eds.) Aliasing in Object-Oriented Programming. LNCS , vol. 7850 , pp. 407 -- 442 . Springer , Heidelberg. Smans, J., Jacobs, B., and Piessens, F. 2013. VeriFast for Java: A Tutorial. In: Clarke, D., Noble, J., Wrigstad, T. (eds.) Aliasing in Object-Oriented Programming. LNCS, vol. 7850, pp. 407--442. Springer, Heidelberg."},{"key":"e_1_3_2_1_12_1","unstructured":"The UK Cards Association Limited. 2013. Standard 70 -- Card Acceptor to Acquirer Interface Standards.  The UK Cards Association Limited. 2013. Standard 70 -- Card Acceptor to Acquirer Interface Standards."},{"key":"e_1_3_2_1_13_1","unstructured":"Woodcock J. and Davies J. 1998. Using Z. Prentice Hall.  Woodcock J. and Davies J. 1998. Using Z. Prentice Hall."}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660312","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":13,"alternative-id":["10.1145\/2660267.2660312","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660312","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}