default search action
BibTeX records: Mike Bond
@article{DBLP:journals/ieeesp/BondCMSA15, author = {Mike Bond and Marios O. Choudary and Steven J. Murdoch and Sergei P. Skorobogatov and Ross J. Anderson}, title = {Be Prepared: The {EMV} Preplay Attack}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {2}, pages = {56--64}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.24}, doi = {10.1109/MSP.2015.24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BondCMSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BondCMSA14, author = {Mike Bond and Omar Choudary and Steven J. Murdoch and Sergei P. Skorobogatov and Ross J. Anderson}, title = {Chip and Skim: Cloning {EMV} Cards with the Pre-play Attack}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {49--64}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.11}, doi = {10.1109/SP.2014.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BondCMSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BondFSW13, author = {Mike Bond and George French and Nigel P. Smart and Gaven J. Watson}, editor = {Ed Dawson}, title = {The Low-Call Diet: Authenticated Encryption for Call Counting {HSM} Users}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {359--374}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_23}, doi = {10.1007/978-3-642-36095-4\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BondFSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MurdochBA12, author = {Steven J. Murdoch and Mike Bond and Ross J. Anderson}, title = {How Certification Systems Fail: Lessons from the Ware Report}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {6}, pages = {40--44}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.89}, doi = {10.1109/MSP.2012.89}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MurdochBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-2531, author = {Mike Bond and Omar Choudary and Steven J. Murdoch and Sergei P. Skorobogatov and Ross J. Anderson}, title = {Chip and Skim: cloning {EMV} cards with the pre-play attack}, journal = {CoRR}, volume = {abs/1209.2531}, year = {2012}, url = {http://arxiv.org/abs/1209.2531}, eprinttype = {arXiv}, eprint = {1209.2531}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-2531.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BondFFS12, author = {Mike Bond and Riccardo Focardi and Sibylle B. Fr{\"{o}}schle and Graham Steel}, title = {Analysis of Security APIs (Dagstuhl Seminar 12482)}, journal = {Dagstuhl Reports}, volume = {2}, number = {11}, pages = {155--168}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.11.155}, doi = {10.4230/DAGREP.2.11.155}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BondFFS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BondFSW12, author = {Mike Bond and George French and Nigel P. Smart and Gaven J. Watson}, title = {The low-call diet: Authenticated Encryption for call counting {HSM} users}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2012}, url = {http://eprint.iacr.org/2012/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BondFSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AndersonBCMS11, author = {Ross J. Anderson and Mike Bond and Omar Choudary and Steven J. Murdoch and Frank Stajano}, editor = {George Danezis}, title = {Might Financial Cryptography Kill Financial Innovation? - The Curious Case of {EMV}}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {220--234}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_18}, doi = {10.1007/978-3-642-27576-0\_18}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AndersonBCMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FrenchB10, author = {George French and Mike Bond}, title = {Caveat venditor}, journal = {Inf. Secur. Tech. Rep.}, volume = {15}, number = {1}, pages = {28--32}, year = {2010}, url = {https://doi.org/10.1016/j.istr.2010.10.003}, doi = {10.1016/J.ISTR.2010.10.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FrenchB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MurdochDAB10, author = {Steven J. Murdoch and Saar Drimer and Ross J. Anderson and Mike Bond}, title = {Chip and {PIN} is Broken}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {433--446}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.33}, doi = {10.1109/SP.2010.33}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/MurdochDAB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Bond07, author = {Mike Bond}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Leaving Room for the Bad Guys}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {1}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_1}, doi = {10.1007/978-3-540-77366-5\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Bond07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ThorpeHCCB07, author = {Christopher Thorpe and Jessica Hammer and L. Jean Camp and Jon Callas and Mike Bond}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Virtual Economies: Threats and Risks}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {239--244}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_21}, doi = {10.1007/978-3-540-77366-5\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ThorpeHCCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LinBC07, author = {Amerson Lin and Mike Bond and Jolyon Clulow}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modeling Partial Attacks with Alloy}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {20--33}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_4}, doi = {10.1007/978-3-642-17773-6\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/LinBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AdidaBCLAR07, author = {Ben Adida and Mike Bond and Jolyon Clulow and Amerson Lin and Ross J. Anderson and Ronald L. Rivest}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On the Security of the {EMV} Secure Messaging {API} (Extended Abstract)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {147--149}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_17}, doi = {10.1007/978-3-642-17773-6\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AdidaBCLAR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YounABCHLRA07, author = {Paul Youn and Ben Adida and Mike Bond and Jolyon Clulow and Jonathan Herzog and Amerson Lin and Ronald L. Rivest and Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Robbing the Bank with a Theorem Prover - (Abstract)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {171}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_21}, doi = {10.1007/978-3-642-17773-6\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YounABCHLRA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BondC06, author = {Mike Bond and Jolyon Clulow}, title = {Integrity of intention (a theory of types for security APIs)}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {93--99}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.003}, doi = {10.1016/J.ISTR.2006.03.003}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BondC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/AndersonBCS06, author = {Ross J. Anderson and Mike Bond and Jolyon Clulow and Sergei P. Skorobogatov}, title = {Cryptographic Processors-A Survey}, journal = {Proc. {IEEE}}, volume = {94}, number = {2}, pages = {357--369}, year = {2006}, url = {https://doi.org/10.1109/JPROC.2005.862423}, doi = {10.1109/JPROC.2005.862423}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/AndersonBCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BondD06, author = {Mike Bond and George Danezis}, editor = {Christian Hempelmann and Victor Raskin}, title = {A pact with the devil}, booktitle = {Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006}, pages = {77--82}, publisher = {{ACM}}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1278952}, timestamp = {Thu, 29 Nov 2018 11:17:10 +0100}, biburl = {https://dblp.org/rec/conf/nspw/BondD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AdidaBCLMAR06, author = {Ben Adida and Mike Bond and Jolyon Clulow and Amerson Lin and Steven J. Murdoch and Ross J. Anderson and Ronald L. Rivest}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Phish and Chips}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {40--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_7}, doi = {10.1007/978-3-642-04904-0\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AdidaBCLMAR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bond06, author = {Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Phish and Chips}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {49--51}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_8}, doi = {10.1007/978-3-642-04904-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bond06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonB06, author = {Ross J. Anderson and Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Man-in-the-Middle Defence}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {153--156}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_20}, doi = {10.1007/978-3-642-04904-0\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BondD05, author = {Mike Bond and George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dining Freemasons (Security Protocols for Secret Societies)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {258--265}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_32}, doi = {10.1007/978-3-540-77156-2\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BondD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bond05, author = {Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dining Freemasons (Security Protocols for Secret Societies)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {266--275}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_33}, doi = {10.1007/978-3-540-77156-2\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bond05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/BondC04, author = {Mike Bond and Jolyon Clulow}, editor = {Ed Dawson and Wolfgang Klemm}, title = {Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {140--151}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 13:22:45 +0200}, biburl = {https://dblp.org/rec/conf/cau/BondC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BondC05, author = {Mike Bond and Jolyon Clulow}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Extending Security Protocol Analysis: New Challenges}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {13--24}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.09.036}, doi = {10.1016/J.ENTCS.2004.09.036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BondC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClaytonB02, author = {Richard Clayton and Mike Bond}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Experience Using a Low-Cost {FPGA} Design to Crack {DES} Keys}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {579--592}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_42}, doi = {10.1007/3-540-36400-5\_42}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClaytonB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BondA01, author = {Mike Bond and Ross J. Anderson}, title = {API-Level Attacks on Embedded Systems}, journal = {Computer}, volume = {34}, number = {10}, pages = {67--75}, year = {2001}, url = {https://doi.org/10.1109/2.955101}, doi = {10.1109/2.955101}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BondA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Bond01, author = {Mike Bond}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and David Naccache and Christof Paar}, title = {Attacks on Cryptoprocessor Transaction Sets}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2162}, pages = {220--234}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44709-1\_19}, doi = {10.1007/3-540-44709-1\_19}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Bond01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.