Relay Attacks on Secure Element-Enabled Mobile Devices - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Relay Attacks on Secure Element-Enabled Mobile Devices

Résumé

Near Field Communication’s card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly different threat vector. A mobile phone’s permanent connectivity to a global network and the possibility to install arbitrary applications permit a significantly improved relay scenario. This paper presents a relay attack scenario where the attacker no longer needs physical proximity to the phone. Instead, simple relay software needs to be distributed to victims’ mobile devices. This publication describes this relay attack scenario in detail and assesses its feasibility based on measurement results.
Fichier principal
Vignette du fichier
978-3-642-30436-1_1_Chapter.pdf (380.85 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01518227 , version 1 (04-05-2017)

Licence

Paternité

Identifiants

Citer

Michael Roland, Josef Langer, Josef Scharinger. Relay Attacks on Secure Element-Enabled Mobile Devices. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.1-12, ⟨10.1007/978-3-642-30436-1_1⟩. ⟨hal-01518227⟩
70 Consultations
511 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More