Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited

Michael Roland, Josef Langer, Josef Scharinger

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

18 Citations (Scopus)

Abstract

Near Field Communication's card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly different threat vector. A mobile phone's permanent connectivity to a global network and the possibility to install arbitrary applications permit a significantly improved relay scenario. This paper presents a relay attack scenario where the attacker no longer needs physical proximity to the phone. Instead, simple relay software needs to be distributed to victims' mobile devices. This publication describes this relay attack scenario in detail and assesses its feasibility based on measurement results.
Original languageEnglish
Title of host publicationInformation Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings
PublisherSpringer Verlag
Pages1-12
Number of pages12
ISBN (Print)978-3-642-30435-4
DOIs
Publication statusPublished - 2012
Event27th IFIP TC 11 International Information Security and Privacy Conference, SEC 2012 - Heraklion, Crete, Greece
Duration: 4 Jun 20126 Jun 2012
http://www.sec2012.org/

Publication series

NameIFIP Advances in Information and Communication Technology
Volume376 AICT
ISSN (Print)1868-4238

Conference

Conference27th IFIP TC 11 International Information Security and Privacy Conference, SEC 2012
CountryGreece
CityHeraklion, Crete
Period04.06.201206.06.2012
Internet address

Fingerprint Dive into the research topics of 'Relay Attacks on Secure Element-enabled Mobile Devices: Virtual Pickpocketing Revisited'. Together they form a unique fingerprint.

Cite this