{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:18Z","timestamp":1750306458829,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818020","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"441-450","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Getting to know your Card"],"prefix":"10.1145","author":[{"given":"Andriana","family":"Gkaniatsou","sequence":"first","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Fiona","family":"McNeill","sequence":"additional","affiliation":[{"name":"Heriot-Watt University, UK"}]},{"given":"Alan","family":"Bundy","sequence":"additional","affiliation":[{"name":"University of Edinburgh, UK"}]},{"given":"Graham","family":"Steel","sequence":"additional","affiliation":[{"name":"Cryptosense, France"}]},{"given":"Riccardo","family":"Focardi","sequence":"additional","affiliation":[{"name":"Ca' Foscari University, Italy"}]},{"given":"Claudio","family":"Bozzato","sequence":"additional","affiliation":[{"name":"Ca' Foscari University, Italy"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"37","volume-title":"SEC","author":"Barbu G.","year":"2012","unstructured":"G. Barbu , C. Giraud , and V. Guerin . Embedded eavesdropping on java card . In SEC , pages 37 -- 48 , 2012 . G. Barbu, C. Giraud, and V. Guerin. Embedded eavesdropping on java card. In SEC, pages 37--48, 2012."},{"key":"e_1_3_2_1_2_1","first-page":"173","volume-title":"Smart Card Research and Advanced Applications","author":"Benadjila R.","year":"2014","unstructured":"R. Benadjila , T. Calderon , and M. Daubignard . Caml crush: A pkcs# 11 filtering proxy . In Smart Card Research and Advanced Applications , pages 173 -- 192 . Springer , 2014 . R. Benadjila, T. Calderon, and M. Daubignard. Caml crush: A pkcs# 11 filtering proxy. In Smart Card Research and Advanced Applications, pages 173--192. Springer, 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866337"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_5"},{"key":"e_1_3_2_1_7_1","volume-title":"The Smart Card Detective: a hand-held emv interceptor","author":"Choudary O.","year":"2010","unstructured":"O. Choudary . The Smart Card Detective: a hand-held emv interceptor , University of Cambridge, Computer Laboratory , Darwin College , MPhil thesis, 2010 . O. Choudary. The Smart Card Detective: a hand-held emv interceptor, University of Cambridge, Computer Laboratory, Darwin College, MPhil thesis, 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_32"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"issue":"4424","key":"e_1_3_2_1_10_1","first-page":"538","volume":"2007","author":"Cortier V.","year":"2007","unstructured":"V. Cortier , G. Keighren , and G. Steel . Automatic analysis of the security of XOR-based key management schemes,. In O. Grumberg and M. Huth, editors, TACAS 2007 , number 4424 in LNCS, pages 538 -- 552 , 2007 . V. Cortier, G. Keighren, and G. Steel. Automatic analysis of the security of XOR-based key management schemes,. In O. Grumberg and M. Huth, editors, TACAS 2007, number 4424 in LNCS, pages 538--552, 2007.","journal-title":"In O. Grumberg and M. Huth, editors, TACAS"},{"key":"e_1_3_2_1_11_1","first-page":"87","volume-title":"In Proceedings of the 6th International Workshop on Issues in the Theory of Security","author":"Courant J.","year":"2006","unstructured":"J. Courant and J.-F. Monin . Defending the Bank with a Proof assistant . In In Proceedings of the 6th International Workshop on Issues in the Theory of Security , pages 87 -- 98 , 2006 . J. Courant and J.-F. Monin. Defending the Bank with a Proof assistant. In In Proceedings of the 6th International Workshop on Issues in the Theory of Security, pages 87--98, 2006."},{"volume-title":"WITS 2006, 2006. In WITS proceedings.","author":"Courant J.","key":"e_1_3_2_1_12_1","unstructured":"J. Courant and J.-F. Monin . Defending the bank with a proof assistant . In WITS 2006, 2006. In WITS proceedings. J. Courant and J.-F. Monin. Defending the bank with a proof assistant. In WITS 2006, 2006. In WITS proceedings."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07","author":"Cui W.","year":"2007","unstructured":"W. Cui , J. Kannan , and H. J. Wang . Discoverer: Automatic protocol reverse engineering from network traces . In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07 , pages 14: 1 -- 14 :14, 2007 . W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse engineering from network traces. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, pages 14:1--14:14, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(92)90222-D"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.189"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.16"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.33"},{"key":"e_1_3_2_1_18_1","volume-title":"v2.20. PKCS#11: Cryptographic Token Interface Standard","author":"RSA","year":"2004","unstructured":"RSA Security INC. v2.20. PKCS#11: Cryptographic Token Interface Standard , 2004 . RSA Security INC. v2.20. PKCS#11: Cryptographic Token Interface Standard, 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11532231_24"},{"key":"e_1_3_2_1_20_1","volume-title":"Analysis of PKCS#11 using AVISPA tools. Master thesis","author":"Tsalapati E.","year":"2007","unstructured":"E. Tsalapati . Analysis of PKCS#11 using AVISPA tools. Master thesis , University of Edinburgh , 2007 . E. Tsalapati. Analysis of PKCS#11 using AVISPA tools. Master thesis, University of Edinburgh, 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813102"},{"key":"e_1_3_2_1_23_1","volume-title":"Robbing the bank with a theorem prover. Technical report","author":"Youn P.","year":"2005","unstructured":"P. Youn , B. Adida , M. Bond , J. Clulow , J. Herzog , A. Lin , R. L. Rivest , and R. Anderson . Robbing the bank with a theorem prover. Technical report , Univerisity of Cambridge , 2005 . P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. L. Rivest, and R. Anderson. Robbing the bank with a theorem prover. Technical report, Univerisity of Cambridge, 2005."}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Los Angeles CA USA","acronym":"ACSAC 2015"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818020"}},"subtitle":["Reverse-Engineering the Smart-Card Application Protocol Data Unit"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":22,"alternative-id":["10.1145\/2818000.2818020","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818020","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}