Reverse Engineering of RFID devices

نویسنده

  • Wouter Bokslag
چکیده

This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID technology and possible countermeasures that could limit the potential of such reverse engineering attempts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reverse-Engineering a Cryptographic RFID Tag

The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms. These algorithms and their weaknesses are frequently disclosed through reverse-engineering software, but it is commonly thought to be too expensive to reconstruct designs from a hardware implementation alone. This paper challenges that belief by presenting an approach to reverse-engineering a c...

متن کامل

RFID In Reverse Logistics - Research Framework and Roadmap

Reverse logistics is constantly gaining in importance for both research and practice. Research on RFID has so far concentrated on the use of RFID in order to support forward logistics processes, but is beginning to realize the specific potentials and benefits of RFID systems in this evolving research area. IS research has so far addressed individual and rather isolated aspects of this topic. In...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

The Reverse Logistics Management with Rfid Applications

This paper presents the main matters of RFID as the modern tool using in reverse logistics management. It is very important to understand the power of reverse logistics, because nowadays the traditional one is not enough to deal with all environmental problems facing companies. The reason for this article is to analyze the reverse logistics evolution, to show its basic terms, rules and conditions.

متن کامل

Security Analysis of a Cryptographically-Enabled RFID Device

We describe our success in defeating the security of an RFID device known as a Digital Signature Transponder (DST). Manufactured by Texas Instruments, DST (and variant) devices help secure millions of SpeedPassTM payment transponders and automobile ignition keys. Our analysis of the DST involved three phases: 1. Reverse engineering: Starting from a rough published schematic, we determined the c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1507.02196  شماره 

صفحات  -

تاریخ انتشار 2015