{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:05:05Z","timestamp":1755993905538,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3690134.3694824","type":"proceedings-article","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T06:22:58Z","timestamp":1732256578000},"page":"125-133","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Three Taps for Secure Machine-to-Machine Communication: Towards High Assurance yet Fully Local Machine Pairing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6695-7599","authenticated-orcid":false,"given":"Sibylle","family":"Fr\u00f6schle","sequence":"first","affiliation":[{"name":"Hamburg University of Technology, Hamburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7920-1000","authenticated-orcid":false,"given":"Martin","family":"Kubisch","sequence":"additional","affiliation":[{"name":"Airbus CRT, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218252"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3030213"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Gildas Avoine Muhammed Ali Bing\u00f6l Ioana Boureanu Srdjan ?apkun Gerhard Hancke S\u00fcleyman Karda? Chong Hee Kim C\u00e9dric Lauradoux Benjamin Martin Jorge Munilla Alberto Peinado Kasper Bonne Rasmussen Dave Singel\u00e9e Aslan Tchamkerten Rolando Trujillo-Rasua and Serge Vaudenay. 2018. Security of Distance-Bounding: A Survey. Comput. Surveys 51 5 (2018).","DOI":"10.1145\/3264628"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2022.3154689"},{"key":"e_1_3_2_1_5_1","volume-title":"Distance-Bounding Protocols. In Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT ?93)","author":"Brands Stefan","year":"1994","unstructured":"Stefan Brands and David Chaum. 1994. Distance-Bounding Protocols. In Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT ?93). Springer-Verlag, 344--359."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.17"},{"volume-title":"Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. In 16th USENIX Security Symposium (USENIX Security 07)","author":"Drimer Saar","key":"e_1_3_2_1_7_1","unstructured":"Saar Drimer and Steven J. Murdoch. 2007. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. In 16th USENIX Security Symposium (USENIX Security 07). USENIX Association."},{"key":"e_1_3_2_1_8_1","unstructured":"T. Finke and H. Kelter. 2005. Radio Frequency Identification - Abh\u00f6rm\u00f6glichkeiten der Kommunikation zwischen Leseger\u00e4t und Transponder am Beispiel eines ISO14443-Systems. Bundesamt f\u00fcr Sicherheit in der Informationstechnik."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2748278"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile","volume":"2","author":"Francis Lishoy","year":"2013","unstructured":"Lishoy Francis, Gerhard Hancke, and Keith Mayes. 2013. A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones. Int. Journal of RFID Security and Cryprography 2, 1--4 (2013), 92--106.","journal-title":"Journal of RFID Security and Cryprography"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of SIMUL 2023: The Fifteenth International Conference on Advances in System Simulation. Thinkmind Digital Library, 50 -- 58","author":"Fr\u00f6schle Sibylle","year":"2023","unstructured":"Sibylle Fr\u00f6schle and Martin Kubisch. 2023. Security Process for Adopting Machine to Machine Communication for Maintenance in Transportation with a Focus on Key Establishment. In Proceedings of SIMUL 2023: The Fifteenth International Conference on Advances in System Simulation. Thinkmind Digital Library, 50 -- 58. https:\/\/www.thinkmind.org\/index.php?view=article&articleid=simul_2023_ 1_90_50045"},{"key":"e_1_3_2_1_12_1","article-title":"Key Establishment for Maintenance with Machine to Machine Communication in Transportation: Security Process and Mitigation Measures","volume":"17","author":"Fr\u00f6schle Sibylle","year":"2024","unstructured":"Sibylle Fr\u00f6schle and Martin Kubisch. 2024. Key Establishment for Maintenance with Machine to Machine Communication in Transportation: Security Process and Mitigation Measures. International Journal on Advances in Security 17, 1&2 (2024). https:\/\/www.iariajournals.org\/security\/","journal-title":"International Journal on Advances in Security"},{"key":"e_1_3_2_1_13_1","volume-title":"Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain. CoRR abs\/2004.02516","author":"Fr\u00f6schle Sibylle B.","year":"2020","unstructured":"Sibylle B. Fr\u00f6schle, Martin Kubisch, and Marlon Gr\u00e4fing. 2020. Security Analysis and Design for TAGA: a Touch and Go Assistant in the Aerospace Domain. CoRR abs\/2004.02516 (2020). arXiv:2004.02516 https:\/\/arxiv.org\/abs\/2004.02516"},{"key":"e_1_3_2_1_14_1","volume-title":"An RFID Distance Bounding Protocol. In First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)","author":"Hancke G.P.","year":"2005","unstructured":"G.P. Hancke and M.G. Kuhn. 2005. An RFID Distance Bounding Protocol. In First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05). 67--73. https:\/\/doi.org\/10.1109\/ SECURECOMM.2005.56"},{"key":"e_1_3_2_1_15_1","volume-title":"Workshop on RFID Security.","author":"Haselsteiner Ernst","year":"2006","unstructured":"Ernst Haselsteiner and Klemens Breitfu\u00df. 2006. Security in Near Field Communication (NFC). Strengths and weaknesses. In Workshop on RFID Security."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"volume-title":"Cryptology and Network Security","author":"Kim Chong Hee","key":"e_1_3_2_1_17_1","unstructured":"Chong Hee Kim and Gildas Avoine. 2009. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In Cryptology and Network Security. Springer Berlin Heidelberg, 119--133."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"Kirschenbaum Ilan","year":"2006","unstructured":"Ilan Kirschenbaum and Avishai Wool. 2006. How to Build a Low-cost, Extendedrange RFID Skimmer. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15. USENIX Association, Article 4."},{"volume-title":"Encyclopedia of Cryptography and Security","author":"Li Ming","key":"e_1_3_2_1_19_1","unstructured":"Ming Li,Wenjing Lou, and Kui Ren. 2011. Secure Device Pairing. In Encyclopedia of Cryptography and Security. Springer US, 1111--1115."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596782"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218252"},{"key":"e_1_3_2_1_22_1","volume-title":"Distance-Bounding Protocols: Verification Without Time and Location. In 2018 IEEE Symposium on Security and Privacy (SP). 549--566","author":"Mauw Sjouke","year":"2018","unstructured":"Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, and Rolando Trujillo-Rasua. 2018. Distance-Bounding Protocols: Verification Without Time and Location. In 2018 IEEE Symposium on Security and Privacy (SP). 549--566. https:\/\/doi.org\/10.1109\/ SP.2018.00001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.111413.00196"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.33"},{"key":"e_1_3_2_1_25_1","unstructured":"Steven J. Olivieri. 2015. An Investigation of Security In Near Field Communication Systems. Ph.D. Dissertation. Worcester Polytechnic Institute."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929854"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.6"},{"key":"e_1_3_2_1_29_1","volume-title":"Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. In 2022 IEEE Symposium on Security and Privacy (SP). 2285--2303","author":"Xu Dongyan","year":"2022","unstructured":"JianliangWu, RuoyuWu, Dongyan Xu, Dave Jing Tian, and Antonio Bianchi. 2022. Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities. In 2022 IEEE Symposium on Security and Privacy (SP). 2285--2303. https:\/\/doi.org\/10. 1109\/SP46214.2022.9833777"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594376"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the Sixth Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690134.3694824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690134.3694824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:28:23Z","timestamp":1755916103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690134.3694824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":30,"alternative-id":["10.1145\/3690134.3694824","10.1145\/3690134"],"URL":"https:\/\/doi.org\/10.1145\/3690134.3694824","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2024-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}