23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bolan, C. (2007). A s<strong>in</strong>gle channel attack on 915MH radio frequency<br />

identification systems. In C. Valli & A. Woodward (Ed.), Proceed<strong>in</strong>gs of<br />

the 5 th Australian Information Security Management Conference (pp. 8-<br />

16). Perth, Western Australia: School of Computer and Information<br />

Science.<br />

Bolan, C. (2009). A spoof<strong>in</strong>g attack aga<strong>in</strong>st an EPC Class One <strong>RFID</strong> system.<br />

Paper presented at the 7th Australian Information Security Management<br />

Conference Perth, Western Australia.<br />

Borriello, G. (2005). <strong>RFID</strong>: tagg<strong>in</strong>g the world. The Communications of the ACM,<br />

48(9), 34-37.<br />

Bra<strong>in</strong>ard, J., Juels, A., Rivest, R., Szydlo, M., & Yung, M. (2006). Fourth factor<br />

authentication: somebody you know. In Proceed<strong>in</strong>gs of the 13 th ACM<br />

Conference on Computer and Communications Security, (168-178). New<br />

York, USA: Association for Comput<strong>in</strong>g Mach<strong>in</strong>ery. doi:<br />

10.1145/1180405.1180427<br />

Britz, M. T. (2009). Computer forensics and cyber crime. New Jersey, U.S.A:<br />

Prentice Hall.<br />

Carrier, B. (2005). File system forensic analysis. Upper Saddle River, New Jersey,<br />

United States of America: Pearson Education, Inc.<br />

Cerrudo, C. (2003). Manipulat<strong>in</strong>g Microsoft SQL Server us<strong>in</strong>g SQL <strong>in</strong>jection.<br />

Technical report, Application Security Inc., 2003, 1-14. Retrieved from<br />

http://www.appsec<strong>in</strong>c.com/presentations/Manipulat<strong>in</strong>g SQL Server<br />

Us<strong>in</strong>g SQL Injection.pdf<br />

Cerrudo, C. (2009, July). SQL Server anti-forensics: techniques and<br />

countermeasures. Paper presented at the Black Hat USA 2009<br />

Conference, Las Vegas, United States of America. Retrieved from<br />

http://www.blackhat.com/presentations/bh-dc-09/Cerrudo/BlackHat-dc-<br />

09-Cerrudo-SQL-Anti-<strong>Forensics</strong>.pdf<br />

Chalasani, S., & Boppana, R. (2007). Data architectures for <strong>RFID</strong> transactions.<br />

IEEE Transactions on Industrial Informatics, 3(3), pp. 246-257.<br />

Chalasani, S., Boppana, R. V., & Sounderpandian, J. (2005, August 11-14). <strong>RFID</strong><br />

tag reader designs for retail store applications. Paper presented at the<br />

Proceed<strong>in</strong>gs of the Eleventh Americas Conference on Information<br />

Systems (AMCIS 2005), Omaha, NE, United States of America.<br />

160

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!