Reverse Engineering of RFID devices
نویسنده
چکیده
This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID technology and possible countermeasures that could limit the potential of such reverse engineering attempts.
منابع مشابه
Reverse-Engineering a Cryptographic RFID Tag
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These algorithms and their weaknesses are frequently disclosed through reverse-engineering software, but it is commonly thought to be too expensive to reconstruct designs from a hardware implementation alone. This paper challenges that belief by presenting an approach to reverse-engineering a c...
متن کاملRFID In Reverse Logistics - Research Framework and Roadmap
Reverse logistics is constantly gaining in importance for both research and practice. Research on RFID has so far concentrated on the use of RFID in order to support forward logistics processes, but is beginning to realize the specific potentials and benefits of RFID systems in this evolving research area. IS research has so far addressed individual and rather isolated aspects of this topic. In...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملThe Reverse Logistics Management with Rfid Applications
This paper presents the main matters of RFID as the modern tool using in reverse logistics management. It is very important to understand the power of reverse logistics, because nowadays the traditional one is not enough to deal with all environmental problems facing companies. The reason for this article is to analyze the reverse logistics evolution, to show its basic terms, rules and conditions.
متن کاملSecurity Analysis of a Cryptographically-Enabled RFID Device
We describe our success in defeating the security of an RFID device known as a Digital Signature Transponder (DST). Manufactured by Texas Instruments, DST (and variant) devices help secure millions of SpeedPassTM payment transponders and automobile ignition keys. Our analysis of the DST involved three phases: 1. Reverse engineering: Starting from a rough published schematic, we determined the c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1507.02196 شماره
صفحات -
تاریخ انتشار 2015