Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06)
DOI: 10.1109/percom.2006.32
|View full text |Cite
|
Sign up to set email alerts
|

Is Your Cat Infected with a Computer Virus?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
77
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 124 publications
(78 citation statements)
references
References 4 publications
1
77
0
Order By: Relevance
“…Adversaries may use RFID tags to launch buffer overflows on the back-end RFID middleware. Although this might not be trivial, considering the memory storage of RFID tags, there are still commands that allow an RFID tag to send the same data block repetitively (Rieback et al 2006) in order to overflow a buffer in the back-end RFID middleware. Other options include the use of other devices with more resources such as smart cards or devices that are able to emulate multiple RFID tags (e.g.…”
Section: Middleware Attacks -Buffer Overflowsmentioning
confidence: 99%
See 3 more Smart Citations
“…Adversaries may use RFID tags to launch buffer overflows on the back-end RFID middleware. Although this might not be trivial, considering the memory storage of RFID tags, there are still commands that allow an RFID tag to send the same data block repetitively (Rieback et al 2006) in order to overflow a buffer in the back-end RFID middleware. Other options include the use of other devices with more resources such as smart cards or devices that are able to emulate multiple RFID tags (e.g.…”
Section: Middleware Attacks -Buffer Overflowsmentioning
confidence: 99%
“…RFID Guardian). -Malicious Code Injection: RFID tags can be used in order to propagate hostile code that subsequently could infect other entities of the RFID network (readers and connecting networks) (Rieback et al 2006). In this scenario, an adversary uses the memory space of RFID tags in order to store and spread in the back-end system the infecting viruses or other RFID malware.…”
Section: Middleware Attacks -Buffer Overflowsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore here we shall refrain from a prevalent review and focus on those works that are most directly related to our contribution. Further interested readers may go through [8], [4] and [5].…”
Section: Related Workmentioning
confidence: 99%