Security of Ubiquitous Computing Systems

Table of Contents:
  1. Template Attacks
  2. Wallet Databases with Observers
  3. Automated Dynamic Analysis
  4. Improved Linear Hull Attack
  5. Ultralightweight RFID Authentication
  6. Relay Cost Bounding for EMV Payments
  7. Graph-Based Comparison of Executable Objects
  8. Practical-Time Related-Key Attack
  9. Distance Bounding RFID Protocols
  10. Reverse Engineering Flash EEPROM Memories

Overview

This collection synthesizes research and hands-on analyses focused on securing pervasive computing environments. It emphasizes applied cryptography, engineering trade-offs for constrained devices, and reproducible experimental methods that connect academic cryptanalysis to practical defenses. Case studies range from contactless payment systems and RFID to embedded IoT sensors and firmware-level vulnerabilities, showing how real-world implementations diverge from ideal cryptographic models and how practitioners can close those gaps.

What you will learn

  • Foundational cryptography: Concise, application-focused treatments of symmetric and asymmetric primitives, authenticated encryption, key management patterns, and the role of entropy in secure key generation.
  • Attack methods and diagnostics: Worked examples of template attacks, side-channel and related-key analyses, and linear-hull techniques that illustrate how information leakage and design choices lead to practical exploits.
  • Design for constrained platforms: Engineering patterns and trade-offs for lightweight and ultralightweight cryptography suited to low-power, low-memory devices.
  • Protocol resilience: Approaches to distance-bounding, relay resistance, and authentication hardening for contactless and payment systems.
  • Implementation assessment: Techniques for dynamic and automated analysis, reverse engineering of embedded storage, and graph-based executable comparison to reveal implementation-level weaknesses.

Topics and teaching approach

The material pairs rigorous cryptanalytic walkthroughs with practical mitigation strategies. Chapters demonstrate measurement methodologies for side-channel leakage, statistical methods for evaluating randomness sources, and reproducible experimental setups for verifying attacks and defenses. The pedagogical style stresses reproducibility: proofs and theory are complemented by scripts, measurement procedures, and experimental results that readers can follow or adapt for coursework, labs, or product assessments.

Practical applications

Readers will find immediately actionable guidance for security engineering tasks: threat modeling contactless payment and RFID deployments, selecting and benchmarking lightweight primitives, and integrating automated firmware analysis into development pipelines. The emphasis on measurable outcomes—performance benchmarks, leakage profiles, and exploit timelines—helps teams prioritize mitigations that balance security, cost, and device constraints.

Who should read this

The compilation is well suited to advanced undergraduates, graduate students, security researchers, and embedded systems engineers. Students gain reproducible lab exercises and project ideas; researchers get detailed attack narratives and experimental baselines; practitioners receive engineering patterns and testing methodologies for incident response and product hardening.

How to use this material effectively

Adopt a project-oriented learning path: start with conceptual chapters aligned to your goals—whether protocol analysis, cryptographic primitive design, or firmware testing—then reproduce key experiments and adapt them into small projects. Combine the readings with incremental assignments such as implementing a lightweight cipher in a simulator, reproducing a side-channel measurement, or running entropy tests on device outputs to build both theoretical understanding and practical competence.

Suggested exercises and projects

  • Lightweight cipher implementation: Build and benchmark a reference implementation on a constrained simulator, document trade-offs, and test for common implementation errors.
  • Side-channel lab: Capture timing or power traces for a crypto routine, perform a basic differential analysis, and report mitigation effectiveness.
  • Protocol assessment: Evaluate an RFID or contactless protocol for relay and distance vulnerabilities, then design and test countermeasures.
  • Entropy and randomness toolkit: Assemble a compact suite of statistical tests to compare entropy sources and recommend practical hardening steps.

Final notes

This resource balances research rigor with engineering relevance, making it a practical reference for anyone working on embedded security, IoT hardening, or cryptographic protocol strengthening. Its reproducible experiments and engineering-focused conclusions provide a clear pathway from academic findings to testable, deployable improvements in ubiquitous computing systems.


Author
Gildas Avoine, Julio Hernandez-Castro
Downloads
444
Pages
268
Size
2.31 MB

Safe & secure download • No registration required