2011 Third International Workshop on Near Field Communication 2011
DOI: 10.1109/nfc.2011.16
|View full text |Cite
|
Sign up to set email alerts
|

Practical Attacks on NFC Enabled Cell Phones

Abstract: Near Field Communication (NFC) technology enables devices to communicate wirelessly within proximity distance. These NFC devices are often embedded into smart posters that offer the ability to exchange small files, photos and contact details. The Nokia 6212 Classic is currently the most popular NFC phone. It allows users to easily exchange digital objects using the NFC interface. To do so, two phones should be within the proximity coupling distance of 5 cm. This paper shows that the NFC feature that invokes a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(31 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…For instance, an NDEF can contain an URI, which can be interpreted as a request to open the web browser and load that page. Other things that an NDEF may contain include a file, a phone number, or a Bluetooth pairing record [44]. Figure 2 shows an example NFC transaction.…”
Section: Ndef Formatmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, an NDEF can contain an URI, which can be interpreted as a request to open the web browser and load that page. Other things that an NDEF may contain include a file, a phone number, or a Bluetooth pairing record [44]. Figure 2 shows an example NFC transaction.…”
Section: Ndef Formatmentioning
confidence: 99%
“…Again, Mulliner was one of the first to the scene in this case, performing extensive message fuzzing to identify NDEF messages that would trigger unexpected behavior on the Nokia 6131 cell phone [27]. In a similar vein, Verdult and Kooman explored the NDEF message format in [44]. Their work focused on finding inherent flaws with the NDEF format rather than identifying particularly troublesome messages.…”
Section: Nfc Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…Several attacks on NFC enabled mobile phones have been shown, yet most of them target the use of passive tags [36,28], while we make use of the card emulation mode whose security greatly depends on its implementation (in our case the Blackberry Java API). The main threats introduced by the NFC communication link include: eavesdropping, data corruption/modification or insertion, as well as denial-of-service attacks [22].…”
Section: Introductionmentioning
confidence: 99%
“…Preventing these denial-of-service attacks is very hard as known from other contactless communication links. Relay attacks are also considered a threat for NFC [36]. However, in the transportation domain it is hard to realize them in practice since it would require an attacker to bring one device in close proximity to the payment machine and another one in close proximity to the user device, while additionally having access to the e-cash application on the user device.…”
Section: Introductionmentioning
confidence: 99%