Trojan of Things: Embedding Malicious NFC Tags into Common Objects
نویسندگان
چکیده
We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFCenabled mobile devices such as smartphones. The key idea of ToT attacks is to covertly embed maliciously programmed NFC tags into common objects routinely encountered in daily life such as banknotes, clothing, or furniture, which are not considered as NFC touchpoints. To fully explore the threat of ToT, we develop two striking techniques named ToT device and Phantom touch generator. These techniques enable an attacker to carry out various severe and sophisticated attacks unbeknownst to the device owner who unintentionally puts the device close to a ToT. We discuss the feasibility of the attack as well as the possible countermeasures against the threats of ToT attacks.
منابع مشابه
Hardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملConnecting the Mobile Phone with the Internet of Things – Benefits of EPC and NFC Compatibility
Introduction Computers these days are no longer just placed on desktops in the form of stationary machines, they are also embedded into everyday objects. The seamless integration of computing capabilities within physical objects is the foundation for an Internet of Things, which interlinks the physical world of goods and items with the virtual world of services and data bases. The most prominen...
متن کاملInternet of Things Track
UI generation stylesheet Abstract UI to XHTML stylesheet Abstract UI description XHTML [Java ME] Apache Cocoon framework OWL-S description Service User Interface Annotation description Abstract widget type modelwidget type model Abstract parameter type modelparameter type model Figure 2. The Pervasive Service Interaction (Perci) framework architecture. Perci provides for integrated interaction ...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملTriggering Hardware Trojans in EPC C1G2 RFID Tags
This paper addresses the Hardware Trojan issues in passive EPC C1G2 RFID Tags. We propose in this paper to study the insertion of malicious circuit in EPC GEN2 RFID tags. The description and the implementation of several different Hardware Trojans are first discussed. Then they are all evaluated in an EPC GEN2 environment using a dedicated FPGA based tag emulator. The evaluation focuses on crit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1702.07124 شماره
صفحات -
تاریخ انتشار 2017