@inproceedings{sec07,
	author = {Saar Drimer and Steven J. Murdoch},
	title = {Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks},
	year = {2007},
	series = {16th USENIX Security Symposium},
	pages = {Pp. 87�102 of the Proceedings}
,url = {http://usenix.org/events/sec07/tech/drimer.html}
,abstract = { 
Modern smartcards, capable of sophisticated cryptography, provide a high assurance of tamper resistance and are thus commonly used in payment applications. 
Although extracting secrets out of smartcards requires resources beyond the means of many would-be thieves, the manner in which they are used can be exploited for fraud.  
Cardholders authorize financial transactions by presenting the card and disclosing a PIN to a terminal without any assurance as to the amount being charged or who is to be paid, and have no means of discerning whether the terminal is authentic or not. 
Even the most advanced smartcards cannot protect customers from being defrauded by the simple relaying of data from one location to another. 
We describe the development of such an attack, and show results from live experiments on the UK's EMV implementation, <i>Chip & PIN</i>. 
We discuss previously proposed defences, and show that these cannot provide the required security assurances.
A new defence based on a distance bounding protocol is described and implemented, which requires only modest alterations to current hardware and software.
As far as we are aware, this is the first complete design and implementation of a secure distance bounding protocol.
Future smartcard generations could use this design to provide cost-effective resistance to relay attacks, which are a genuine threat to deployed applications.
We also discuss the security-economics impact to customers of enhanced authentication mechanisms.

<ul>}
}