49 research outputs found

    From Physical to Cyber: Escalating Protection for Personalized Auto Insurance

    Full text link
    Nowadays, auto insurance companies set personalized insurance rate based on data gathered directly from their customers' cars. In this paper, we show such a personalized insurance mechanism -- wildly adopted by many auto insurance companies -- is vulnerable to exploit. In particular, we demonstrate that an adversary can leverage off-the-shelf hardware to manipulate the data to the device that collects drivers' habits for insurance rate customization and obtain a fraudulent insurance discount. In response to this type of attack, we also propose a defense mechanism that escalates the protection for insurers' data collection. The main idea of this mechanism is to augment the insurer's data collection device with the ability to gather unforgeable data acquired from the physical world, and then leverage these data to identify manipulated data points. Our defense mechanism leveraged a statistical model built on unmanipulated data and is robust to manipulation methods that are not foreseen previously. We have implemented this defense mechanism as a proof-of-concept prototype and tested its effectiveness in the real world. Our evaluation shows that our defense mechanism exhibits a false positive rate of 0.032 and a false negative rate of 0.013.Comment: Appeared in Sensys 201

    Practical Attacks on NFC Enabled Cell Phones

    Get PDF
    Contains fulltext : 92208.pdf (publisher's version ) (Open Access)2011 3rd International Workshop on Near Field Communication (NFC), February 22, Hagenber

    Scrutinizing WPA2 password generating algorithms in wireless routers

    Get PDF
    Contains fulltext : 151602.pdf (preprint version ) (Open Access)WOOT'15 : 9th USENIX Workshop on Offensive Technologies, August 10-11,2015, Washington, D.C

    Gone in 360 Seconds: Hijacking with Hitag2

    Get PDF
    Contains fulltext : 103396.pdf (author's version ) (Open Access)21st USENIX Security Symposium, August 8-10, 2012, Belleveu, W

    Blackboard Security Assessment

    Get PDF
    Contains fulltext : 117321.pdf (publisher's version ) (Open Access)31 p

    Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research : Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012)

    Get PDF
    Contains fulltext : 94153.pdf (preprint version ) (Open Access)9 p

    Exposing iClass key diversification

    Get PDF
    Contains fulltext : 91798.pdf (author's version ) (Open Access)WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologie

    A Toolbox for RFID Protocol Analysis

    Get PDF
    Contains fulltext : 103299.pdf (author's version ) (Open Access)2012 Fourth International EURASIP Workshop on RFID Technology (EURASIP RFID), 27-28 Sept. 2012, Torino, Ital

    Dismantling SecureMemory, CryptoMemory and CryptoRF

    Get PDF
    Contains fulltext : 83892.pdf (publisher's version ) (Open Access
    corecore