Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags
نویسندگان
چکیده
Nowadays privacy in the connected world is a big user’s concern. The ubiquity of mobile devices permits billions of users browse the web at anytime, anywhere. Near Field Communication (NFC) appeared as a seamlessly and simply communication protocol between devices. Commercial services such as Android Pay, and Apple Pay offer contactless payment methods that are spreading in more and more scenarios. However, we take risks while using NFC on Android devices, we can be hacked, and our privacy can be affected. In this paper we study the current vulnerabilities in the NFC-Android ecosystem. We conduct a series of experiments and we expose that with NFC and Android devices are vulnerable to URL/URI spoofing, Bank/social network information hacking, and user’s device tracking via fingerprint and geo-location. It is important for the community to understand the problem and come up solution that can tackle these issues and inform the users about privacy awareness and risks on using these contactless services.
منابع مشابه
MORENA: A Middleware for Programming NFC-Enabled Android Applications as Distributed Object-Oriented Programs
NFC is a wireless technology that allows software to interact with RFID tags and that is increasingly integrated into smartphones and other mobile devices. In this paper, we present MORENA: a middleware that treats NFC-enabled programs as distributed object-oriented programs in which RFID tags are represented as intermittently connected remote objects. We draw inspiration from the ambient-orien...
متن کاملA Secure Communication Model for HCE based NFC Services
Near Field Communication (NFC) is a new promising short-range wireless communication technology that provides ease of use by triggering the communication with a simple touch and making the user feel secure by short distance communication. Most promising functionality of NFC technology is via card emulation operating mode that enables an NFC Smartphone to behave like a contactless smart card. By...
متن کاملSmartTokens: Delegable Access Control with NFC-Enabled Smartphones
Today’s smartphones and tablets offer compelling computing and storage capabilities enabling a variety of mobile applications with rich functionality. The integration of new interfaces, in particular near field communication (NFC) opens new opportunities for new applications and business models, as the most recent trend in industry for payment and ticketing shows. These applications require sto...
متن کاملTrakChain Estimates Costs for Track and Trace in the Internet of (many) Things
Evaluation After the NFC-based inventory system was introduced, problems with using this approach in a practical environment soon became apparent. These problems were caused by the poor response of NFC tags, when any metal object was in their vicinity. As even some smartphones have metal cases, this resulted in a poor NFC communication reception. Thus, the evaluation recommends that smartphones...
متن کاملAccess Control and Management System Based on NFC-Technology by the Use of Smart Phones as Keys
In today's world, we always carry all sorts of keys (house keys, garage keys, office keys, car keys) and/or pass cards. Furthermore, we keep all of them in our pockets or wallets; they occupy a lot of space and weigh a lot. In addition to this, we carry gadgets (smart phones, tablets, smart watches, etc.) which are essential in today's life. After thinking all this, authors came up to the idea ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1705.02081 شماره
صفحات -
تاریخ انتشار 2017