首页 | 本学科首页   官方微博 | 高级检索  
     


RFID malware: Design principles and examples
Authors:Melanie R  Patrick ND  Bruno and Andrew S
Affiliation:

aDepartment of Computer Science, Vrije Universiteit, De Boelelaan 1081a, 1081 HV, Amsterdam, Netherlands

bDepartment of Information and Communication Technology, University of Trento, Via Sommarive, 14, 38050, Trento, Italy

Abstract:This paper explores the concept of malware for Radio Frequency Identification (RFID) systems — including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range of target platforms. This paper concludes by warning RFID middleware developers to build appropriate checks into their RFID middleware before it achieves wide-scale deployment in the real world.
Keywords:Radio Frequency Identification  RFID  Security  Malware  Exploit  Worm  Virus
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号