bachelor
bachelor
bachelor
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 3<br />
Attacks on Rejsekortet<br />
As described in the previous chapter attacks on Rejsekortet can be divided into<br />
four different categories of cheating the system, plus vandalism. Vandalism is<br />
important to bring into the picture because personal gain might not be the only<br />
motivation to perform an attack; if it is possible to make “digital graffiti,” or just<br />
cause a general disruption of the system, some people might still be interested.<br />
Especially if it introduces plausible deniability (“I couldn’t check-in because all<br />
the terminals were broken”).<br />
The other attacks can be assumed to be motivated by the outlook to free travel.<br />
We can divide these attacks into two different kinds:<br />
• Attacks that enable free travel for just the attacker’s card. These attacks<br />
are the rollback and masquerading attacks. As we shall see in section 3.3,<br />
the latter is at this point impossible due to a technical constraint.<br />
• Attacks that are focused on the core security system. If such an attack<br />
is carried out, the overall security of Rejsekortet is decreased. Such an<br />
attack is described in 3.2.