Suche senden
Hochladen
ePassport reloaded goes mobile
•
3 gefällt mir
•
1,260 views
J
Jeroen van Beek
Folgen
My BlackHat Europe 2009 slides about ePassport (in)security.
Weniger lesen
Mehr lesen
Business
Technologie
Melden
Teilen
Melden
Teilen
1 von 41
Empfohlen
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
An Online secure ePassport Protocol
An Online secure ePassport Protocol
Vijay Pasupathinathan, PhD
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
Tariq Tauheed
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
Rima Hajou
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
The Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
Empfohlen
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
An Online secure ePassport Protocol
An Online secure ePassport Protocol
Vijay Pasupathinathan, PhD
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
Tariq Tauheed
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
Rima Hajou
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
The Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
Introduction to cryptography
Introduction to cryptography
Amir Neziri
Electronic credentials
Electronic credentials
Amir Neziri
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
Session 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
Two-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Information Security Awareness Group
Make the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
Smartcard
Smartcard
aashish2cool4u
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
Weitere ähnliche Inhalte
Was ist angesagt?
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
Introduction to cryptography
Introduction to cryptography
Amir Neziri
Electronic credentials
Electronic credentials
Amir Neziri
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
Session 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
Two-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Information Security Awareness Group
Was ist angesagt?
(13)
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Introduction to cryptography
Introduction to cryptography
Electronic credentials
Electronic credentials
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Session 7 e_raja_kailar
Session 7 e_raja_kailar
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
A Security Framework in RFID
A Security Framework in RFID
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Two-factor Authentication
Two-factor Authentication
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Ähnlich wie ePassport reloaded goes mobile
Make the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
Smartcard
Smartcard
aashish2cool4u
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Faheem Nadeem
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Jason Shen
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
Pierre-Jean Verrando
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
DroneSec
Rebooting the smartcard
Rebooting the smartcard
Eric Larcheveque
Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
Mobile security
Mobile security
Stefaan
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
ClubHack
IOT Forensics
IOT Forensics
MuhammadAwaisQureshi6
Ict project (1)
Ict project (1)
spy007s
Ähnlich wie ePassport reloaded goes mobile
(20)
Make the Smartcard great again
Make the Smartcard great again
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Smartcard
Smartcard
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
Rebooting the smartcard
Rebooting the smartcard
Module 7 (sniffers)
Module 7 (sniffers)
Mobile security
Mobile security
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
IOT Forensics
IOT Forensics
Ict project (1)
Ict project (1)
Kürzlich hochgeladen
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
P&CO
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Seo
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Workforce Group
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Seta Wicaksana
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
rwgiffor
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Damini Dixit
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
uneakwhite
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
kapoorjyoti4444
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
kapoorjyoti4444
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
NZSG
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Kürzlich hochgeladen
(20)
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
ePassport reloaded goes mobile
1.
ePassports reloaded goes
mobile Jeroen van Beek BlackHat Europe 2009, Amsterdam
2.
3.
4.
Technology overview, ct.
5.
Technology overview, ct.
doors RFID reader and optical scanner camera
6.
7.
8.
9.
10.
11.
“ Employee Amsterdam
Airport steals blank passports” Passports were part of diplomatic mail.
12.
Path of attack
step 1, ct. + = +
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Passive Authentication =
=
23.
24.
Finding new flaws,
ct. +
25.
26.
Clone with your
phone = + + +
27.
28.
29.
30.
31.
32.
33.
34.
35.
In 2002, 1.200
blank Dutch IDs were stolen. The printing company SDU did not officially report the crime(!) until the first documents were seen in the field in 2004…
36.
37.
38.
39.
Questions
40.
Thank you! Contact
details:
41.