Skip to main content

Showing 1–2 of 2 results for author: Voris, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:1005.0657  [pdf, other

    cs.CR cs.HC

    Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing

    Authors: Alexander Gallego, Nitesh Saxena, Jonathan Voris

    Abstract: The secure "pairing" of wireless devices based on auxiliary or out-of-band (OOB) communication, such as audio, visual, or tactile channels, is a well-established research direction. However, prior work shows that this approach to pairing can be prone to human errors of different forms that may directly or indirectly translate into man-in-the-middle attacks. To address this problem, we propose a ge… ▽ More

    Submitted 6 May, 2010; v1 submitted 4 May, 2010; originally announced May 2010.

    Comments: This paper is 11 pages with 3 figures

  2. arXiv:0907.1256  [pdf, other

    cs.CR

    We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)

    Authors: Nitesh Saxena, Jonathan Voris

    Abstract: Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS) [14, 15], involves the use of onboard RAM as the source of "true" randomness. Unfortunately, practical considerations pr… ▽ More

    Submitted 7 July, 2009; originally announced July 2009.

    Comments: Presented at the 5th Workshop on RFID Security held from June 30 - July 2 in Leuven, Belgium. Paper is 13 pages with 4 figures