@inproceedings{cojocar2015pie,
    author      = {Cojocar, Lucian and Zaddach, Jonas and Verdult, Roel and Bos, Herbert and Francillon, Aur{\'e}lien and Balzarotti, Davide},
    title       = {{PIE}: Parser Identification in Embedded Systems},
    booktitle   = {31st Annual Computer Security Applications Conference (ACSAC 2015)},
    publisher   = {ACM},
    year        = {2015},
}

@misc{verdult2015streamciphers,
    author      = {Verdult, Roel},
    title       = {Introduction to Cryptanalysis: Attacking Stream Ciphers},
    publisher   = {Radboud University Nijmegen},
    year        = {2012},
    month       = {August},
    note        = {\emph{Manuscript}},
}

@inproceedings{vandenbroek2015imsi,
    title       = {Defeating {IMSI} Catchers},
    author      = {van den Broek, Fabian and Verdult, Roel and de Ruiter, Joeri},
    booktitle   = {22nd ACM Conference on Computer and Communications Security (CCS 2015)},
    pages       = {340--351},
    publisher   = {ACM},
    year        = {2015},
}

@inproceedings{meijer2015mifare,
    title       = {Ciphertext-only Cryptanalysis on Hardened {Mifare Classic} Cards},
    author      = {Meijer, Carlo and Verdult, Roel},
    booktitle   = {22nd ACM Conference on Computer and Communications Security (CCS 2015)},
    pages       = {18--30},
    publisher   = {ACM},
    year        = {2015},
}

@inproceedings{verdult2015megamos,
    author      = {Verdult, Roel and Garcia, Flavio D. and Ege, Bar{\i}\c{s}},
    title       = {Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer},
    booktitle   = {22nd USENIX Security Symposium (USENIX Security 2013)},
    publisher   = {USENIX Association},
    pages       = {703--718},
    year        = {2015},
}

@inproceedings{lorente2015wpa2,
    title       = {Scrutinizing {WPA2} Password Generating Algorithms in Wireless Routers},
    author      = {Lorente, Eduardo Novella and Meijer, Carlo and Verdult, Roel},
    booktitle   = {9th USENIX Workshop on Offensive Technologies (USENIX WOOT 2015)},
    publisher   = {USENIX Association},
    year        = {2015}
}

@phdthesis{verdult2015thesis,
    author      = {Roel Verdult}, 
    title       = {The (in)security of proprietary cryptography},
    school      = {Radboud University, The Netherlands and KU Leuven, Belgium},
    year        = {2015},
    month       = {April},
}

@article{garcia2014iclass,
    title       = {Wirelessly lockpicking a smart card reader},
    author      = {Garcia, Flavio D. and de Koning Gans, Gerhard and Verdult, Roel},
    journal     = {International Journal of Information Security},
    volume      = {13},
    number      = {5},
    pages       = {403--420},
    year        = {2014},
    publisher   = {Springer-Verlag},
}

@inproceedings{verdult2013megamos,
    author      = {Verdult, Roel and Garcia, Flavio D. and Ege, Bar{\i}\c{s}},
    title       = {Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer},
    booktitle   = {Presentation at 22nd USENIX Security Symposium (USENIX Security 2013)},
    publisher   = {USENIX Association},
    year        = {2013},
}

@inproceedings{burgers2013session,
    title       = {Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials},
    author      = {Burgers, Willem and Verdult, Roel and van Eekelen, Marko},
    booktitle   = {18th Nordic Conference on Secure IT Systems (NordSec 2013)},
    publisher   = {Springer-Verlag},
    series      = {Lecture Notes in Computer Science},
    volume      = {8208},
    year        = {2013},
    pages       = {33--50}
}

@inproceedings{blom2012usb,
    title       = {Designed to Fail: A {USB}-Connected Reader for Online Banking},
    author      = {Blom, Arjan and de Koning Gans, Gerhard and Poll, Erik and de Ruiter, Joeri and Verdult, Roel},
    booktitle   = {17th Nordic Conference on Secure IT Systems (NordSec 2012)},
    publisher   = {Springer-Verlag},
    series      = {Lecture Notes in Computer Science},
    volume      = {7617},
    year        = {2012},
    pages       = {1--16}
}

@inproceedings{verdult2012toolbox,
    title       = {A Toolbox for {RFID} Protocol Analysis},
    author      = {Verdult, Roel and de Koning Gans, Gerhard and Garcia, Flavio D.},
    booktitle   = {4th International EURASIP Workshop on RFID Technology (EURASIP RFID 2012)},
    publisher   = {IEEE Computer Society},
    year        = {2012},
    pages       = {27--34}
}

@inproceedings{garcia2012iclass,
    title       = {Dismantling {iClass and iClass Elite}},
    author      = {Garcia, Flavio D. and de Koning Gans, Gerhard and Verdult, Roel and Meriac, Milosch},
    booktitle   = {17th European Symposium on Research in Computer Security (ESORICS 2012)},
    publisher   = {Springer-Verlag},
    series      = {Lecture Notes in Computer Science},
    volume      = {7459},
    pages       = {697--715},
    year        = {2012},
}

@inproceedings{verdult2012hitag2,
    title       = {Gone in 360 Seconds: Hijacking with {Hitag2}},
    author      = {Verdult, Roel and Garcia, Flavio D. and Balasch, Josep},
    booktitle   = {21st USENIX Security Symposium (USENIX Security 2012)},
    publisher   = {USENIX Association},
    pages       = {237--252},
    year        = {2012},
}

@inproceedings{alpar2012nfc,
    title       = {Using {NFC} Phones for Proving Credentials},
    author      = {Alp{\'a}r, Gergely. and Batina, Lejla and Verdult, Roel},
    booktitle   = {16th Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance (MMB\&DFT 2012)},
    publisher   = {Springer-Verlag},
    series      = {Lecture Notes in Computer Science},
    volume      = {7201},
    pages       = {317--330},
    year        = {2012},
}

@inproceedings{balasch2012cryptomemory,
    title       = {Power Analysis of {Atmel CryptoMemory} - Recovering Keys from Secure {EEPROMs}},
    author      = {Balasch, Josep and Gierlichs, Benedikt and Verdult, Roel and Batina, Lejla and Verbauwhede, Ingrid},
    booktitle   = {12th Cryptographers' Track at the RSA Conference (CT-RSA 2012)},
    publisher   = {Springer-Verlag},
    series      = {Lecture Notes in Computer Science},
    volume      = {7178},
    pages       = {19--34},
    year        = {2012},
}

@inproceedings{garcia2011iclass,
    title       = {Exposing {iClass} Key Diversification},
    author      = {Garcia, Flavio D. and de Koning Gans, Gerhard and Verdult, Roel},
    booktitle   = {5th USENIX Workshop on Offensive Technologies (WOOT 2011)},
    publisher   = {USENIX Association},
    pages       = {128--136},
    year        = {2011}
}

@inproceedings{verdult2011nfc,
    title       = {Practical Attacks on {NFC} Enabled Cell Phones},
    author      = {Verdult, Roel and Kooman, Fran\c{c}ois},
    booktitle   = {3rd International Workshop on Near Field Communication (NFC 2011)},
    publisher   = {IEEE Computer Society},
    pages       = {77--82},
    year        = {2011},
}

@inproceedings{garcia2010cryptomemory,
    title       = {Dismantling {SecureMemory, CryptoMemory and CryptoRF}},
    author      = {Garcia, Flavio D. and van Rossum, Peter and Verdult, Roel and Wichers Schreur, Ronny},
    booktitle   = {17th ACM Conference on Computer and Communications Security (CCS 2010)},
    publisher   = {ACM},
    pages       = {250--259},
    year        = {2010},
}

@inproceedings{garcia2009mifare,
    title       = {Wirelessly Pickpocketing a {MIFARE Classic} Card},
    author      = {Garcia, Flavio D. and van Rossum, Peter and Verdult, Roel and Wichers Schreur, Ronny},
    booktitle   = {30th IEEE Symposium on Security and Privacy (S\&P 2009)},
    publisher   = {IEEE Computer Society},
    pages       = {3--15},
    year        = {2009},
}

@inproceedings{garcia2008mifare,
    title       = {Dismantling {MIFARE Classic}},
    author      = {Garcia, Flavio D. and de Koning Gans, Gerhard and Muijrers, Ruben and van Rossum, Peter and Verdult, Roel and Wichers Schreur, Ronny and Jacobs, Bart},
    booktitle   = {13th European Symposium on Research in Computer Security (ESORICS 2008)},
    publisher   = {Springer-Verlag},
    series      = {Lecture Notes in Computer Science},
    volume      = {5283},
    pages       = {97--114},
    year        = {2008},
}

@techreport{garcia2012proxmark,
    title       = {Tutorial: {Proxmark}, the Swiss Army Knife for {RFID} Security Research},
    author      = {Garcia, Flavio D. and de Koning Gans, Gerhard and Verdult, Roel},
    institution = {Radboud University Nijmegen},
    year        = {2012},
    howpublished= {\emph{Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012)}},
}

@mastersthesis{verdult2008security,
    author      = {Roel Verdult},
    title       = {Security Analysis of {RFID} Tags},
    school      = {Radboud University Nijmegen},
    month       = {July},
    year        = {2008},
}

@misc{wichersschreur2008security,
    author      = {Wichers Schreur, Ronny and van Rossum, Peter and Garcia, Flavio and Teepe, Wouter and Hoepman, Jaap-Henk and Jacobs, Bart and de Koning Gans, Gerhard and Verdult, Roel and Muijrers, Ruben and Kali, Ravindra and Kali, Vinesh},
    title       = {Security Flaw in {MIFARE Classic}},
    month       = {March},
    year        = {2008},
    howpublished= {\emph{Press release, Digital Security group, Radboud University Nijmegen, The Netherlands}},
}

@techreport{verdult2008proof,
    author      = {Roel Verdult},
    title       = {Proof of Concept, Cloning the {OV}-chip Card},
    institution = {Radboud University Nijmegen},
    month       = {January},
    year        = {2008},
}
