Roel Verdult
Roel Verdult
FactorIT BV
Verified email at factorit.nl - Homepage
Title
Cited by
Cited by
Year
Dismantling MIFARE Classic
FD Garcia, G de Koning Gans, R Muijrers, P Van Rossum, R Verdult, ...
13th European Symposium on Research in Computer Security (ESORICS 2008), 97-114, 2008
2902008
Wirelessly Pickpocketing a MIFARE Classic Card
FD Garcia, P Rossum, R Verdult, R Wichers Schreur
30th IEEE Symposium on Security and Privacy (S&P 2009), 3-15, 2009
1802009
Gone in 360 seconds: Hijacking with Hitag2
R Verdult, FD Garcia, J Balasch
21st USENIX Security Symposium (USENIX Security 2012), 237-252, 2012
1222012
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
R Verdult, FD Garcia, B Ege
22nd USENIX Security Symposium (USENIX Security 2013), 2013
1012013
Practical Attacks on NFC Enabled Cell Phones
R Verdult, F Kooman
3rd International Workshop on Near Field Communication (NFC 2011), 77-82, 2011
822011
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
12th Cryptographers' Track at the RSA Conference (CT-RSA 2012), 19-34, 2012
722012
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
22nd ACM Conference on Computer and Communications Security (CCS 2015), 340-351, 2015
622015
Dismantling SecureMemory, CryptoMemory and CryptoRF
FD Garcia, P van Rossum, R Verdult, R Wichers Schreur
17th ACM Conference on Computer and Communications Security (CCS 2010), 250-259, 2010
412010
Using NFC Phones for Proving Credentials
G Alpár, L Batina, R Verdult
16th Measurement, Modelling, and Evaluation of Computing Systems and De …, 2012
372012
Dismantling iClass and iClass Elite
FD Garcia, G de Koning Gans, R Verdult, M Meriac
17th European Symposium on Research in Computer Security (ESORICS 2012), 697-715, 2012
322012
Proof of Concept, Cloning the OV-chip Card
R Verdult
Technical report, Radboud University Nijmegen, 2008
312008
Designed to Fail: A USB-Connected Reader for Online Banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), 1-16, 2012
292012
Security Analysis of RFID Tags
R Verdult
Radboud University Nijmegen, 2008
292008
A Toolbox for RFID Protocol Analysis
R Verdult, G de Koning Gans, FD Garcia
4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012), 2012
242012
Exposing iClass Key Diversification
FD Garcia, G de Koning Gans, R Verdult
5th USENIX Workshop on Offensive Technologies (WOOT 2011), 128-136, 2011
232011
Security Flaw in MIFARE Classic
RW Schreur, P van Rossum, F Garcia, W Teepe, JH Hoepman, B Jacobs, ...
Press release, Digital Security group, Radboud University Nijmegen, 2008
232008
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
EN Lorente, C Meijer, R Verdult
9th USENIX Workshop on Offensive Technologies (WOOT 2015), 2015
212015
Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research
FD Garcia, G de Koning Gans, R Verdult
Technical report, Radboud University Nijmegen, 2012
212012
The (in)security of proprietary cryptography
R Verdult
Radboud University and KU Leuven, 2015
202015
PIE: Parser identification in embedded systems
L Cojocar, J Zaddach, R Verdult, H Bos, A Francillon, D Balzarotti
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
132015
The system can't perform the operation now. Try again later.
Articles 1–20