IEEE Security and Privacy
Insights on identity documents based on the Belgian case study
Information Security Tech. Report
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Secure and precise location verification using distance bounding and simultaneous multilateration
Proceedings of the second ACM conference on Wireless network security
PSP: private and secure payment with RFID
Proceedings of the 8th ACM workshop on Privacy in the electronic society
E-passport: the global traceability or how to feel like a UPS package
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
E-Passport: cracking basic access control keys
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Vulnerabilities in first-generation RFID-enabled credit cards
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
e-Passports as a means towards a Globally Interoperable Public Key Infrastructure
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
A location based security framework for authenticating mobile phones
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
On the security issues of NFC enabled mobile phones
International Journal of Internet Technology and Secured Transactions
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Security in Bluetooth, RFID and wireless sensor networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
A framework for analyzing RFID distance bounding protocols
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
A traceability attack against e-passports
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
A novel RFID distance bounding protocol based on physically unclonable functions
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Gone in 360 seconds: Hijacking with Hitag2
Security'12 Proceedings of the 21st USENIX conference on Security symposium
E-passports as a means towards the first world-wide public key infrastructure
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
PSP: Private and secure payment with RFID
Computer Communications
Hi-index | 0.00 |
The number of RFID devices used in everyday life has increased, along with concerns about their security and user privacy. This paper describes our initial findings on practical attacks that we implemented against 'proximity' (ISO 14443 A) type RFID tokens. Focusing mainly on the RF communication interface we discuss the results and implementation of eavesdropping, unauthorized scanning and relay attacks. Although most of these attack scenarios are regularly mentioned in literature little technical details have been published previously. We also present a short overview of mechanisms currently available to prevent these attacks.