26.12.2014 Views

bachelor

bachelor

bachelor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 3<br />

Attacks on Rejsekortet<br />

As described in the previous chapter attacks on Rejsekortet can be divided into<br />

four different categories of cheating the system, plus vandalism. Vandalism is<br />

important to bring into the picture because personal gain might not be the only<br />

motivation to perform an attack; if it is possible to make “digital graffiti,” or just<br />

cause a general disruption of the system, some people might still be interested.<br />

Especially if it introduces plausible deniability (“I couldn’t check-in because all<br />

the terminals were broken”).<br />

The other attacks can be assumed to be motivated by the outlook to free travel.<br />

We can divide these attacks into two different kinds:<br />

• Attacks that enable free travel for just the attacker’s card. These attacks<br />

are the rollback and masquerading attacks. As we shall see in section 3.3,<br />

the latter is at this point impossible due to a technical constraint.<br />

• Attacks that are focused on the core security system. If such an attack<br />

is carried out, the overall security of Rejsekortet is decreased. Such an<br />

attack is described in 3.2.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!