TY - GEN
T1 - Range extension attacks on contactless smart cards
AU - Oren, Yossef
AU - Schirman, Dvir
AU - Wool, Avishai
PY - 2013/10/4
Y1 - 2013/10/4
N2 - The security of many near-field RFID systems such as credit cards, access control, e-passports, and e-voting, relies on the assumption that the tag holder is in close proximity to the reader. This assumption should be reasonable due to the fact that the nominal operation range of the RFID tag is only few centimeters. In this work we demonstrate a range extension setup which breaks this proximity assumption. Our system allows full communications with a near-field RFID reader from a range of 115cm - two orders of magnitude greater than nominal range - and uses power that can be supplied by a car battery. The added flexibility offered to an attacker by this range extension significantly improves the effectiveness and practicality of relay attacks on real-world systems.
AB - The security of many near-field RFID systems such as credit cards, access control, e-passports, and e-voting, relies on the assumption that the tag holder is in close proximity to the reader. This assumption should be reasonable due to the fact that the nominal operation range of the RFID tag is only few centimeters. In this work we demonstrate a range extension setup which breaks this proximity assumption. Our system allows full communications with a near-field RFID reader from a range of 115cm - two orders of magnitude greater than nominal range - and uses power that can be supplied by a car battery. The added flexibility offered to an attacker by this range extension significantly improves the effectiveness and practicality of relay attacks on real-world systems.
KW - Contactless smart card
KW - ISO/IEC 14443
KW - RFID
KW - Relay attack
UR - http://www.scopus.com/inward/record.url?scp=84884756745&partnerID=8YFLogxK
U2 - https://doi.org/10.1007/978-3-642-40203-6_36
DO - https://doi.org/10.1007/978-3-642-40203-6_36
M3 - Conference contribution
SN - 9783642402029
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 646
EP - 663
BT - Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings
T2 - 18th European Symposium on Research in Computer Security, ESORICS 2013
Y2 - 9 September 2013 through 13 September 2013
ER -