Sciweavers

PERCOM
2006
ACM

RFID malware: Design principles and examples

14 years 4 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range of target platforms. This paper concludes by warning RFID middleware developers to build appropriate checks into their RFID middleware before it achieves wide-scale deployment in the real world. c 2006 Elsevier B.V. All rights reserved.
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C
Added 24 Dec 2009
Updated 24 Dec 2009
Type Conference
Year 2006
Where PERCOM
Authors Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum
Comments (0)