Access Without Permission: A Practical RFID Relay Attack

Roman Silberschneider, Thomas Korak, Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

n this paper, we present a practical relay attack that can be mounted on RFID systems found in many applications nowadays. The described attack uses a self-designed proxy device to forward the RF communication from a reader to a modern NFC-enabled smart phone (Google Nexus S). The phone acts as a mole to inquire a victim’s card in the vicinity of the system. As a practical demon-
stration of our attack, we target a widely used access control application that usually grants access to office
buildings using a strong AES authentication feature. Our attack successfully relays this authentication process via a Bluetooth channel (> 50 meters) within several hundred milliseconds. As a result, we were able to impersonate an
authorized user and to enter the building without being
detected.
Original languageEnglish
Title of host publicationAustrochip 2013, 21st Austrian Workshop on Microelectronics, Linz, Austria, October 10, 2013, Proceedings
Place of PublicationLinz
Publisher.
Pages59-64
Publication statusPublished - 2013
EventAustrochip 2013, 21st Austrian Workshop on Microelectronics: Austrochip 2013 - Linz, Austria
Duration: 10 Oct 201310 Oct 2013

Workshop

WorkshopAustrochip 2013, 21st Austrian Workshop on Microelectronics
Country/TerritoryAustria
CityLinz
Period10/10/1310/10/13

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application

Fingerprint

Dive into the research topics of 'Access Without Permission: A Practical RFID Relay Attack'. Together they form a unique fingerprint.

Cite this