Access Without Permission: A Practical RFID Relay Attack

Roman Silberschneider, Thomas Korak, Michael Hutter

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

n this paper, we present a practical relay attack that can be mounted on RFID systems found in many applications nowadays. The described attack uses a self-designed proxy device to forward the RF communication from a reader to a modern NFC-enabled smart phone (Google Nexus S). The phone acts as a mole to inquire a victim’s card in the vicinity of the system. As a practical demon-
stration of our attack, we target a widely used access control application that usually grants access to office
buildings using a strong AES authentication feature. Our attack successfully relays this authentication process via a Bluetooth channel (> 50 meters) within several hundred milliseconds. As a result, we were able to impersonate an
authorized user and to enter the building without being
detected.
Originalspracheenglisch
TitelAustrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings
ErscheinungsortLinz
Herausgeber (Verlag).
Seiten59-64
PublikationsstatusVeröffentlicht - 2013
Veranstaltung21st Austrian Workshop on Microelectronics: Austrochip 2013 - Linz, Österreich
Dauer: 10 Okt. 201310 Okt. 2013

Workshop

Workshop21st Austrian Workshop on Microelectronics
Land/GebietÖsterreich
OrtLinz
Zeitraum10/10/1310/10/13

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Untersuchen Sie die Forschungsthemen von „Access Without Permission: A Practical RFID Relay Attack“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren