EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Special Uses and Sbuses of the Fiat-Shamir Passport Protocol
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An RFID Distance Bounding Protocol
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Practical Attacks on Proximity Identification Systems (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Smart Cards, Tokens, Security and Applications
Smart Cards, Tokens, Security and Applications
Attacks on time-of-flight distance bounding channels
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Proving your location without giving up your privacy
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Position statement in RFID S&P panel: RFID and the middleman
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Physical-layer identification of RFID devices
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Multichannel protocols to prevent relay attacks
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Secure localization algorithms for wireless sensor networks
IEEE Communications Magazine
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
A location based security framework for authenticating mobile phones
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Mobile electronic identity: securing payment on mobile phones
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
BUPLE: securing passive RFID communication through physical layer enhancements
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer
Proceedings of the third ACM conference on Data and application security and privacy
A Survey on Near Field Communication (NFC) Technology
Wireless Personal Communications: An International Journal
Cloning credit cards: a combined pre-play and downgrade attack on EMV contactless
WOOT'13 Proceedings of the 7th USENIX conference on Offensive Technologies
Secure interaction with piggybacked key-exchange
Pervasive and Mobile Computing
Hi-index | 0.00 |
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications for mobile devices are receiving increased interest and in some cases these services are relying on NFC communication. It has been suggested that NFC systems are particularly vulnerable to relay attacks, and that the attacker's proxy devices could even be implemented using off-the-shelf NFC-enabled devices. This paper describes how a relay attack can be implemented against systems using legitimate peer-to-peer NFC communication by developing and installing suitable MIDlets on the attacker's own NFC-enabled mobile phones. The attack does not need to access secure program memory nor use any code signing, and can use publicly available APIs. We go on to discuss how relay attack countermeasures using device location could be used in the mobile environment. These countermeasures could also be applied to prevent relay attacks on contactless applications using 'passive' NFC on mobile phones.