{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:06Z","timestamp":1755882606399,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chips Joint Undertaking","award":["101007350"],"award-info":[{"award-number":["101007350"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670454","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Passport Control: Mining and Checking Models of Machine Readable Travel Documents"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8556-1541","authenticated-orcid":false,"given":"Stefan","family":"Marksteiner","sequence":"first","affiliation":[{"name":"AVL List Gmbh, Austria and M\u00e4lardalen University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5478-0987","authenticated-orcid":false,"given":"Marjan","family":"Sirjani","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7586-0409","authenticated-orcid":false,"given":"Mikael","family":"Sj\u00f6din","sequence":"additional","affiliation":[{"name":"M\u00e4lardalen University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_17"},{"volume-title":"Principles of Model Checking","author":"Baier Christel","key":"e_1_3_2_1_3_1","unstructured":"Christel Baier and Joost-Pieter Katoen. 2008. Principles of Model Checking. MIT Press."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_5"},{"key":"e_1_3_2_1_6_1","volume-title":"Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research: Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec","author":"Garcia D","year":"2012","unstructured":"Flavio\u00a0D Garcia, GT de Koning\u00a0Gans, and Roel Verdult. 2012. Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research: Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012). Technical Report. Radboud University Nijmegen, ICIS, Nijmegen."},{"key":"e_1_3_2_1_7_1","unstructured":"International Civil Aviation Organization. 2021. Machine Readable Travel Documents \u2013 Part 11: Security Mechanisms for MRTDs (Eigth Edition)."},{"volume-title":"Cards and Security Devices for Personal Identification \u2013 Contactless Proximity Objects \u2013 Part 3: Initialization and Anticollision. ISO\/IEC Standard \"14443-3","author":"International Organization for Standardization. 2018.","key":"e_1_3_2_1_8_1","unstructured":"International Organization for Standardization. 2018. Cards and Security Devices for Personal Identification \u2013 Contactless Proximity Objects \u2013 Part 3: Initialization and Anticollision. ISO\/IEC Standard \"14443-3\". International Organization for Standardization."},{"volume-title":"Cards and Security Devices for Personal Identification \u2013 Contactless Proximity Objects \u2013 Part 4: Transmission Protocol. ISO\/IEC Standard \"14443-4","author":"International Organization for Standardization. 2018.","key":"e_1_3_2_1_9_1","unstructured":"International Organization for Standardization. 2018. Cards and Security Devices for Personal Identification \u2013 Contactless Proximity Objects \u2013 Part 4: Transmission Protocol. ISO\/IEC Standard \"14443-4\". International Organization for Standardization."},{"key":"e_1_3_2_1_10_1","unstructured":"International Organization for Standardization. 2020. Identification Cards \u2013 Integrated Circuit Cards \u2013 Part 4: Organization Security and Commands for Interchange."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11164-3_26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_32"},{"key":"e_1_3_2_1_13_1","volume-title":"Kearns and Umesh Vazirani","author":"J.","year":"1994","unstructured":"Michael\u00a0J. Kearns and Umesh Vazirani. 1994. An Introduction to Computational Learning Theory. MIT Press."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49252-5_13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34781-8_19"},{"key":"e_1_3_2_1_16_1","unstructured":"International Civil\u00a0Aviation Organization. 2021. Machine Readable Travel Documents \u2013 Part 9: Deployment of Biometric Identification and Electronic Storage of Data in MRTDs (Eigth Edition)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73047"},{"volume-title":"Applying Automata Learning to Embedded Control Software","author":"Smeenk Wouter","key":"e_1_3_2_1_18_1","unstructured":"Wouter Smeenk, Joshua Moerman, Frits Vaandrager, and David\u00a0N. Jansen. 2015. Applying Automata Learning to Embedded Control Software. In Formal Methods and Software Engineering, Michael Butler, Sylvain Conchon, and Fatiha Za\u00efdi (Eds.). Springer International Publishing, Cham, 67\u201383."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.32"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670454","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:10Z","timestamp":1755881530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":19,"alternative-id":["10.1145\/3664476.3670454","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670454","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}