首页> 外文会议>International workshop to Radio frequency identification: Security and privacy issues >Practical Experiences on NFC Relay Attacks with Android Virtual Pickpocketing Revisited
【24h】

Practical Experiences on NFC Relay Attacks with Android Virtual Pickpocketing Revisited

机译:重温使用Android虚拟扒窃进行NFC中继攻击的实践经验

获取原文

摘要

Near Field Communication (NFC) is a short-range contact-less communication standard recently emerging as cashless payment technology. However, NFC has been proved vulnerable to several threats, such as eavesdropping, data modification, and relay attacks. A relay attack forwards the entire wireless communication, thus communicating over larger distances. In this paper, we review and discuss feasibility limitations when performing these attacks in Google's Android OS. We also perform an in-depth review of the Android implementation of the NFC stack. We show an experiment proving its feasibility using off-the-shelf NFC-enabled Android devices (i.e., no custom firmware nor root required). Thus, Android NFC-capable malicious software might appear before long to virtually pickpocket contactless payment cards within its proximity.
机译:近场通信(NFC)是一种近距离非接触式通信标准,近来已成为无现金支付技术。但是,事实证明,NFC容易受到多种威胁,例如窃听,数据修改和中继攻击。中继攻击会转发整个无线通信,从而实现更长距离的通信。在本文中,我们回顾并讨论了在Google的Android OS中执行这些攻击时的可行性限制。我们还将对NFC堆栈的Android实现进行深入的审查。我们展示了一个实验,证明了使用现成的支持NFC的Android设备(即无需自定义固件也不需要root用户)的可行性。因此,具有Android NFC功能的恶意软件可能不久就会出现,以虚拟方式窃取其附近的非接触式支付卡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号