Abstract
Near Field Communication's card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly different threat vector. A mobile phone's permanent connectivity to a global network and the possibility to install arbitrary applications permit a significantly improved relay scenario. This paper presents a relay attack scenario where the attacker no longer needs physical proximity to the phone. Instead, simple relay software needs to be distributed to victims' mobile devices. This publication describes this relay attack scenario in detail and assesses its feasibility based on measurement results.
Original language | English |
---|---|
Title of host publication | Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Proceedings |
Publisher | Springer |
Pages | 1-12 |
Number of pages | 12 |
ISBN (Print) | 978-3-642-30435-4 |
DOIs | |
Publication status | Published - 2012 |
Event | 27th IFIP TC 11 International Information Security and Privacy Conference, SEC 2012 - Heraklion, Crete, Greece Duration: 4 Jun 2012 → 6 Jun 2012 http://www.sec2012.org/ |
Publication series
Name | IFIP Advances in Information and Communication Technology |
---|---|
Volume | 376 AICT |
ISSN (Print) | 1868-4238 |
Conference
Conference | 27th IFIP TC 11 International Information Security and Privacy Conference, SEC 2012 |
---|---|
Country/Territory | Greece |
City | Heraklion, Crete |
Period | 04.06.2012 → 06.06.2012 |
Internet address |