Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Author(s)
Detail(s)
Original language | English |
---|---|
Title of host publication | International Conference for Internet Technology and Secured Transactions, ICITST 2009 |
Publication status | Published - 2009 |
Externally published | Yes |
Conference
Title | International Conference for Internet Technology and Secured Transactions, ICITST 2009 |
---|---|
Place | United Kingdom |
City | London |
Period | 9 - 12 November 2009 |
Link(s)
Abstract
In this paper we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded Secure Element (SE), could be used as a mobile token cloning and skimming platform. We show how an attacker could use a NFC mobile phone as such an attack platform by exploiting the existing security controls of the embedded SE and the available contactless APIs. To illustrate the feasibility of these actions we also show how to practically skim and emulate certain tokens typically used in payment and access control applications with a NFC mobile phone. Although such attacks can also be implemented on other contactless platforms, such as custom-built card emulators and modified readers, the NFC-enabled mobile phone has a legitimate form factor, which would be accepted by merchants and arouse less suspicion in public. Finally, we propose several security countermeasures for NFC phones that could prevent such misuse. Copyright © 2009 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved.
Citation Format(s)
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. / Francis, Lishoy; Hancke, Gerhard; Mayes, Keith et al.
International Conference for Internet Technology and Secured Transactions, ICITST 2009. 2009. 5402513.
International Conference for Internet Technology and Secured Transactions, ICITST 2009. 2009. 5402513.
Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review