Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks

USENIX via YouTube

Overview

This course aims to teach learners how to model distance bounding protocols using an extension of the applied pi-calculus. The course covers encoding various security properties in the model, proving a partial order between them, and relating security properties to different attacker models. The teaching method involves demonstrating how to compile the new calculus into the applied pi-calculus for automatic protocol checks using the ProVerif tool. The course is intended for individuals interested in understanding and analyzing security properties of distance bounding protocols, particularly in the context of protecting devices like contactless payment cards or car entry systems.

Syllabus

USENIX Security '18 - Modelling and Analysis of a Hierarchy of Distance Bounding Attacks

Taught by

USENIX

Reviews

Start your review of Modelling and Analysis of a Hierarchy of Distance Bounding Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.