Relay attacks on secure element-enabled mobile devices: Virtual pickpocketing revisited

19Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Near Field Communication's card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly different threat vector. A mobile phone's permanent connectivity to a global network and the possibility to install arbitrary applications permit a significantly improved relay scenario. This paper presents a relay attack scenario where the attacker no longer needs physical proximity to the phone. Instead, simple relay software needs to be distributed to victims' mobile devices. This publication describes this relay attack scenario in detail and assesses its feasibility based on measurement results. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Roland, M., Langer, J., & Scharinger, J. (2012). Relay attacks on secure element-enabled mobile devices: Virtual pickpocketing revisited. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 1–12). Springer New York LLC. https://doi.org/10.1007/978-3-642-30436-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free