2008 Third International Conference on Availability, Reliability and Security 2008
DOI: 10.1109/ares.2008.105
|View full text |Cite
|
Sign up to set email alerts
|

NFC Devices: Security and Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 147 publications
(78 citation statements)
references
References 2 publications
0
77
0
1
Order By: Relevance
“…All read-only and r/w-transponder (without encryption) [12] are in danger; in addition, it cannot be detected by the reader device.…”
Section: Spoofingmentioning
confidence: 99%
See 2 more Smart Citations
“…All read-only and r/w-transponder (without encryption) [12] are in danger; in addition, it cannot be detected by the reader device.…”
Section: Spoofingmentioning
confidence: 99%
“…The attacks range from eavesdropping to data modification, insertion, corruption, and Man-in-the-Middle attacks. In [12], Madlmayr et al…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…When attached to a legitimate surface (say a Red Cross donation appeal poster), a maliciously modified NFC tag interacts with the NFC software on users' smartphones and directs them to a malicious website rather than the Red Cross's. [Madlmayr et al 2008].…”
Section: Md1-lmentioning
confidence: 99%
“…However, without the use of end-to-end security (for example, the use of e-cheque), sophisticated phishing attacks can be developed against mobile payment solutions, for example, a phishing attack can be applied against an NFC based mobile phone by modifying or replacing tags [20]: this can mislead the user to submit data to a wrong party. And some SMS based mobile payment solutions require users to submit their account details in clear text to a third party to log on, and this can lead to an SMS phishing attack: by luring users to submit their account details to a wrong phone number.…”
Section: Phishing/credential Harvestingmentioning
confidence: 99%