“…This article focuses on the active-passive mode and discusses the possibility of restoring erased data by exploiting selected registers in the NDEF tag. Efficient erasure of data from the NFC tag is of extreme importance because if the data are not erased properly, there are chances that data is still available on the tag that might be reused for stealing personal identity, for example, failing to properly erase personal identification data from a tag, such as contact information, personal profiles, Wi-Fi passcodes, 5 Furthermore, if an attacker obtains the information on the tag, he/she can predict the format of the data written on the tag, which could aid in cloning the tag for future attacks on the system. Mitrokotsa et al classified RFID attacks as tag removal, cloning and spoofing, and unauthorized tag reading.…”