{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:11:39Z","timestamp":1775837499561,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/sp.2010.33","type":"proceedings-article","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T18:45:51Z","timestamp":1279651551000},"page":"433-446","source":"Crossref","is-referenced-by-count":112,"title":["Chip and PIN is Broken"],"prefix":"10.1109","author":[{"given":"Steven J.","family":"Murdoch","sequence":"first","affiliation":[]},{"given":"Saar","family":"Drimer","sequence":"additional","affiliation":[]},{"given":"Ross","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Bond","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"MAX1740, MAX1741 SIM\/smart-card level translators in &#x00B5;MAX","year":"2001","journal-title":"Maxim Integrated Products Inc"},{"key":"ref11","article-title":"Spartan-3E starter kit","year":"2009","journal-title":"Xilinx Inc"},{"key":"ref12","year":"2010","journal-title":"BLADOX Turbo SIM"},{"key":"ref13","year":"2009"},{"key":"ref14","first-page":"44","article-title":"Fail-stop protocols: An approach to designing secure protocols","author":"gong","year":"1995","journal-title":"International working conference on Dependable Computing for Critical Applications"},{"key":"ref15","article-title":"The TLS protocol","author":"dierks","year":"1999"},{"key":"ref16","article-title":"Job v Halifax PLC, case number 7BQ00307, commentary by Alistair Kelman","volume":"6","year":"2009","journal-title":"Digital Evidence and Electronic Signature Law Review"},{"key":"ref17","first-page":"98","article-title":"Reliability of chip & PIN evidence in banking disputes","volume":"6","author":"murdoch","year":"2009","journal-title":"Digital Evidence and Electronic Signature Law Review"},{"key":"ref18","article-title":"Risks and potentials of using EMV for Internet payments","author":"herreweghen","year":"1999","journal-title":"USENIX Workshop on Smartcard Technology"},{"key":"ref19","article-title":"Chip and spin","author":"anderson","year":"2005"},{"key":"ref4","article-title":"EMV - Integrated Circuit Card Specifications for Payment Systems","year":"2008","journal-title":"Book 4 Cardholder Attendant and Acquirer Interface Requirements"},{"key":"ref3","article-title":"EMV - Integrated Circuit Card Specifications for Payment Systems","year":"2008","journal-title":"Book 3 Application Specification"},{"key":"ref6","year":"2009","journal-title":"2008 Fraud Figures Announced by APACS"},{"key":"ref5","year":"2009","journal-title":"About EMV"},{"key":"ref8","article-title":"Visa Integrated Circuit Card - Card Specification","year":"2001","journal-title":"Visa International"},{"key":"ref7","year":"2009","journal-title":"Fraud victims struggle to get money back"},{"key":"ref2","article-title":"EMV - Integrated Circuit Card Specifications for Payment Systems","year":"2008","journal-title":"EMV Book 2-Security and Key Management"},{"key":"ref1","article-title":"EMV - Integrated Circuit Card Specifications for Payment Systems","year":"2008","journal-title":"Book 1 Application Independent ICC to Terminal Interface Requirements"},{"key":"ref9","article-title":"EMV PIN verification &#x201C;wedge&#x201D; vulnerability","author":"murdoch","year":"2010"},{"key":"ref20","article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","author":"drimer","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"ref22","article-title":"Chip and PIN is broken","author":"anderson","year":"0","journal-title":"Light Blue Touchpaper Blog"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.16"}],"event":{"name":"2010 IEEE Symposium on Security and Privacy","location":"Oakland, CA, USA","start":{"date-parts":[[2010,5,16]]},"end":{"date-parts":[[2010,5,19]]}},"container-title":["2010 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5504620\/5504699\/05504801.pdf?arnumber=5504801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:32:37Z","timestamp":1489879957000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5504801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/sp.2010.33","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}