首页> 外文会议>Information security and privacy research >Relay Attacks on Secure Element-Enabled Mobile Devices Virtual Pickpocketing Revisited
【24h】

Relay Attacks on Secure Element-Enabled Mobile Devices Virtual Pickpocketing Revisited

机译:再论安全元素使能的移动设备上的中继攻击虚拟扒窃

获取原文
获取原文并翻译 | 示例

摘要

Near Field Communication's card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly different threat vector. A mobile phone's permanent connectivity to a global network and the possibility to install arbitrary applications permit a significantly improved relay scenario. This paper presents a relay attack scenario where the attacker no longer needs physical proximity to the phone. Instead, simple relay software needs to be distributed to victims' mobile devices. This publication describes this relay attack scenario in detail and assesses its feasibility based on measurement results.
机译:Near Field Communication的卡仿真模式是将智能卡与手机结合使用的一种方式。中继攻击方案以非接触式智能卡而闻名。过去,仅在攻击者与启用了NFC的手机物理上接近的情况下才考虑使用中继攻击。但是,移动电话引入了截然不同的威胁向量。移动电话与全球网络的永久连接以及安装任意应用程序的可能性可以显着改善中继状况。本文介绍了一种中继攻击方案,其中攻击者不再需要物理靠近电话。相反,需要将简单的中继软件分发到受害者的移动设备。该出版物详细描述了这种中继攻击情形,并根据测量结果评估了其可行性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号