Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion)

  • Max SpencerEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)


My name is Max and I’ve been working on the Pico project with Frank and the rest of the team since last summer. We’ve just been hearing about some of the deployability advances we’ve been making with Pico, but I’m going to be talking about some security properties of Pico and similar schemes. Specifically I’m going to be talking about a type of relay attack one could carry out on such schemes, were they in common use, and how we’ve changed the way that Pico works to address this threat.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.University of CambridgeCambridgeUK

Personalised recommendations