Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/PERCOM.2006.32guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Is Your Cat Infected with a Computer Virus?

Published: 13 March 2006 Publication History
  • Get Citation Alerts
  • Abstract

    RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as properly formatted but fake RFID data; however no one expects an RFID tag to send a SQL injection attack or a buffer overflow. This paper is meant to serve as a warning that data from RFID tags can be used to exploit back-end software systems. RFID middleware writers must therefore build appropriate checks (bounds checking, special character filtering, etc.), to prevent RFID middleware from suffering all of the well-known vulnerabilities experienced by the Internet. Furthermore, as a proof of concept, this paper presents the first self-replicating RFID virus. This virus uses RFID tags as a vector to compromise backend RFID middleware systems, via a SQL injection attack.

    Cited By

    View all
    • (2015)Modeling and verifying EPC network intrusion system based on timed automataPervasive and Mobile Computing10.1016/j.pmcj.2015.06.00724:C(61-76)Online publication date: 1-Dec-2015
    • (2015)Policy-based SQLIA detection and prevention approach for RFID systemsComputer Standards & Interfaces10.1016/j.csi.2014.08.00538:C(64-71)Online publication date: 1-Feb-2015
    • (2012)A privacy-restoring mechanism for offline RFID systemsProceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks10.1145/2185448.2185458(63-74)Online publication date: 16-Apr-2012
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    PERCOM '06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
    March 2006
    336 pages
    ISBN:0769525180

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 13 March 2006

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)Modeling and verifying EPC network intrusion system based on timed automataPervasive and Mobile Computing10.1016/j.pmcj.2015.06.00724:C(61-76)Online publication date: 1-Dec-2015
    • (2015)Policy-based SQLIA detection and prevention approach for RFID systemsComputer Standards & Interfaces10.1016/j.csi.2014.08.00538:C(64-71)Online publication date: 1-Feb-2015
    • (2012)A privacy-restoring mechanism for offline RFID systemsProceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks10.1145/2185448.2185458(63-74)Online publication date: 16-Apr-2012
    • (2011)Is RFID technology secure and private?Proceedings of the 2011 Information Security Curriculum Development Conference10.1145/2047456.2047462(42-49)Online publication date: 30-Sep-2011
    • (2011)Security issues of a phasor data concentrator for smart grid infrastructureProceedings of the 13th European Workshop on Dependable Computing10.1145/1978582.1978584(3-8)Online publication date: 11-May-2011
    • (2011)Real-time location and inpatient care systems based on passive RFIDJournal of Network and Computer Applications10.1016/j.jnca.2010.04.01134:3(980-989)Online publication date: 1-May-2011
    • (2011)Risks of blind controllers and deaf views in model view controller patterns for multitag user interfacesProceedings of the 19th international conference on Security Protocols10.1007/978-3-642-25867-1_14(150-155)Online publication date: 28-Mar-2011
    • (2010)New mobile payment protocolProceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy10.5555/1948838.1948843(41-46)Online publication date: 14-Dec-2010
    • (2010)An agent based back-end RFID tag management systemProceedings of the 7th international conference on Trust, privacy and security in digital business10.5555/1894888.1894908(165-176)Online publication date: 30-Aug-2010
    • (2010)QR code securityProceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia10.1145/1971519.1971593(430-435)Online publication date: 8-Nov-2010
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media