Suche senden
Hochladen
ePassport reloaded goes mobile
•
3 gefällt mir
•
1,260 views
J
Jeroen van Beek
Folgen
My BlackHat Europe 2009 slides about ePassport (in)security.
Weniger lesen
Mehr lesen
Business
Technologie
Melden
Teilen
Melden
Teilen
1 von 41
Empfohlen
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
An Online secure ePassport Protocol
An Online secure ePassport Protocol
Vijay Pasupathinathan, PhD
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
Tariq Tauheed
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
Rima Hajou
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
The Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
Empfohlen
Formal Security Analysis of Australian ePassport Implementation
Formal Security Analysis of Australian ePassport Implementation
Vijay Pasupathinathan, PhD
An Online secure ePassport Protocol
An Online secure ePassport Protocol
Vijay Pasupathinathan, PhD
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
Tariq Tauheed
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
Rima Hajou
Cardholder authentication for the piv dig sig key nist ir-7863
Cardholder authentication for the piv dig sig key nist ir-7863
RepentSinner
iot hacking, smartlockpick
iot hacking, smartlockpick
idsecconf
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
The Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
Introduction to cryptography
Introduction to cryptography
Amir Neziri
Electronic credentials
Electronic credentials
Amir Neziri
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
Session 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
Two-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Information Security Awareness Group
Make the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
Smartcard
Smartcard
aashish2cool4u
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
Weitere ähnliche Inhalte
Was ist angesagt?
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
iText Group nv
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
Introduction to cryptography
Introduction to cryptography
Amir Neziri
Electronic credentials
Electronic credentials
Amir Neziri
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
Session 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IJNSA Journal
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Alex Tan
Two-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Information Security Awareness Group
Was ist angesagt?
(13)
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
Introduction to cryptography
Introduction to cryptography
Electronic credentials
Electronic credentials
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Session 7 e_raja_kailar
Session 7 e_raja_kailar
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
Why Two-Factor Authentication?
Why Two-Factor Authentication?
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_fa
A Security Framework in RFID
A Security Framework in RFID
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
Two-factor Authentication
Two-factor Authentication
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Ähnlich wie ePassport reloaded goes mobile
Make the Smartcard great again
Make the Smartcard great again
Eric Larcheveque
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
Smartcard
Smartcard
aashish2cool4u
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
Matthew McCullough
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
Duo Security
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Faheem Nadeem
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Tom Eston
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Jason Shen
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
Pierre-Jean Verrando
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
DroneSec
Rebooting the smartcard
Rebooting the smartcard
Eric Larcheveque
Module 7 (sniffers)
Module 7 (sniffers)
Wail Hassan
Mobile security
Mobile security
Stefaan
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
ClubHack
IOT Forensics
IOT Forensics
MuhammadAwaisQureshi6
Ict project (1)
Ict project (1)
spy007s
Ähnlich wie ePassport reloaded goes mobile
(20)
Make the Smartcard great again
Make the Smartcard great again
Automated production of predetermined digital evidence
Automated production of predetermined digital evidence
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Smartcard
Smartcard
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
Rebooting the smartcard
Rebooting the smartcard
Module 7 (sniffers)
Module 7 (sniffers)
Mobile security
Mobile security
Memory forensic analysis (aashish)
Memory forensic analysis (aashish)
IOT Forensics
IOT Forensics
Ict project (1)
Ict project (1)
Kürzlich hochgeladen
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Aggregage
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
Exhibitors Data
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
rajveerescorts2022
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Admir Softic
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
uneakwhite
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Damini Dixit
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Eric T. Tung
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
P&CO
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Workforce Group
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Dipal Arora
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
NZSG
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Sheetaleventcompany
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
allensay1
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
Kürzlich hochgeladen
(20)
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️🔥 Enjoy 24/7 Escort Service
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)- A new venture concept
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
ePassport reloaded goes mobile
1.
ePassports reloaded goes
mobile Jeroen van Beek BlackHat Europe 2009, Amsterdam
2.
3.
4.
Technology overview, ct.
5.
Technology overview, ct.
doors RFID reader and optical scanner camera
6.
7.
8.
9.
10.
11.
“ Employee Amsterdam
Airport steals blank passports” Passports were part of diplomatic mail.
12.
Path of attack
step 1, ct. + = +
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Passive Authentication =
=
23.
24.
Finding new flaws,
ct. +
25.
26.
Clone with your
phone = + + +
27.
28.
29.
30.
31.
32.
33.
34.
35.
In 2002, 1.200
blank Dutch IDs were stolen. The printing company SDU did not officially report the crime(!) until the first documents were seen in the field in 2004…
36.
37.
38.
39.
Questions
40.
Thank you! Contact
details:
41.