The Community for Technology Leaders
2009 International Conference on Availability, Reliability and Security (2009)
Fukuoka Institute of Technology, Fukuoka, Japan
Mar. 16, 2009 to Mar. 19, 2009
ISBN: 978-0-7695-3564-7
pp: 695-700
ABSTRACT
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phones. The situation is critical because NFC is mostly used in the area of payment and ticketing. This paper presents our approach to security testing of NFC-enabled mobile phones. Our approach takes into account not only the NFC-subsystem but also software components that can be controlled through the NFC-interface. Through our testing approach, we were able to identify a number of previously unknown vulnerabilities, some of which can be exploited for spoofing of tag content, an NFC-based worm, and for Denial-of-Service attacks. We further show that our findings can be applied to real world NFC-services.
INDEX TERMS
NFC, Mobile Phones, Vulnerability Analysis, Fuzzing, Phishing, Spoofing
CITATION

C. Mulliner, "Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones," 2009 International Conference on Availability, Reliability and Security(ARES), Fukuoka Institute of Technology, Fukuoka, Japan, 2009, pp. 695-700.
doi:10.1109/ARES.2009.46
82 ms
(Ver 3.3 (11022016))