An NFC Relay Attack with Off-the-shelf Hardware and Software - Management and Security in the Age of Hyperconnectivity Access content directly
Conference Papers Year : 2016

An NFC Relay Attack with Off-the-shelf Hardware and Software

Abstract

Passive Near Field Communication (NFC) devices, such as contactless smart cards, use NFC to communicate with other devices without any physical connection or an internal battery source, deriving power inductively via the radio field generated by the NFC reader device. Today, many Point-of-Sale (PoS) terminals, credit cards, and also mobile devices are NFC-capable and facilitate contactless payments. Although the communication range is typically limited to a few centimeters, NFC attacks exist that exploit such contactless communication channels.This paper focuses on NFC relay attacks and shows that a practical relay attack on public transport PoS terminals, using off-the-shelf mobile devices and hardware, is feasible. Finally, countermeasures are discussed with the main finding that currently the best countermeasure against relay attacks is to physically shield an NFC device.
Fichier principal
Vignette du fichier
385745_1_En_8_Chapter.pdf (1.22 Mo) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01632735 , version 1 (10-11-2017)

Licence

Attribution

Identifiers

Cite

Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller. An NFC Relay Attack with Off-the-shelf Hardware and Software. 10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.71-83, ⟨10.1007/978-3-319-39814-3_8⟩. ⟨hal-01632735⟩
412 View
1123 Download

Altmetric

Share

Gmail Facebook X LinkedIn More