2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.46
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
65
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 98 publications
(65 citation statements)
references
References 2 publications
0
65
0
Order By: Relevance
“…Again, Mulliner was one of the first to the scene in this case, performing extensive message fuzzing to identify NDEF messages that would trigger unexpected behavior on the Nokia 6131 cell phone [27]. In a similar vein, Verdult and Kooman explored the NDEF message format in [44].…”
Section: Nfc Securitymentioning
confidence: 99%
See 3 more Smart Citations
“…Again, Mulliner was one of the first to the scene in this case, performing extensive message fuzzing to identify NDEF messages that would trigger unexpected behavior on the Nokia 6131 cell phone [27]. In a similar vein, Verdult and Kooman explored the NDEF message format in [44].…”
Section: Nfc Securitymentioning
confidence: 99%
“…At least three published papers suggest the idea of implementing a DoS attack using NFC [27,22,42]. The authors of all three papers envision the attacker mounting the DoS attack using a specialized piece of hardware called a jammer rather than another NFC device.…”
Section: Nfc Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Several attacks on NFC enabled mobile phones have been shown, yet most of them target the use of passive tags [36,28], while we make use of the card emulation mode whose security greatly depends on its implementation (in our case the Blackberry Java API). The main threats introduced by the NFC communication link include: eavesdropping, data corruption/modification or insertion, as well as denial-of-service attacks [22].…”
Section: Introductionmentioning
confidence: 99%