The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Practical Attacks on Proximity Identification Systems (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
A platform for RFID security and privacy administration
LISA '06 Proceedings of the 20th conference on Large Installation System Administration
Privacy for public transportation
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Where's the beep?: security, privacy, and user misunderstandings of RFID
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Credit card transaction security
Proceedings of the 4th annual conference on Information security curriculum development
Secure Communication between Web Browsers and NFC Targets by the Example of an e-Ticketing System
EC-Web '08 Proceedings of the 9th international conference on E-Commerce and Web Technologies
Proceedings of the 15th ACM conference on Computer and communications security
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Proceedings of the 16th ACM conference on Computer and communications security
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Visible and controllable RFID tags
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Position statement in RFID S&P panel: RFID and the middleman
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Privacy of recent RFID authentication protocols
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Traceable privacy of recent provably-secure RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Low-power sub-threshold design of secure physical unclonable functions
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Readers behaving badly: reader revocation in PKI-based RFID systems
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
On the security issues of NFC enabled mobile phones
International Journal of Internet Technology and Secured Transactions
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Usability of display-equipped RFID tags for security purposes
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes
Wireless Personal Communications: An International Journal
Location-aware and safer cards: enhancing RFID security and privacy via location sensing
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Optimization schemes for protective jamming
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Resuscitating privacy-preserving mobile payment with customer in complete control
Personal and Ubiquitous Computing
PSP: Private and secure payment with RFID
Computer Communications
Privacy-preserving billing for e-ticketing systems in public transportation
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Cloning credit cards: a combined pre-play and downgrade attack on EMV contactless
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
Optimization Schemes for Protective Jamming
Mobile Networks and Applications
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
User-aided reader revocation in PKI-based RFID systems
Journal of Computer Security - ESORICS 2010
Hi-index | 0.00 |
RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around $150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.