DEFCON 14: A Hacker’s Guide to RFID Spoofing and Jamming



Speaker: Melanie Rieback, RFID Security/PrivacyResearcher, Vrije Universiteit Amsterdam

Abstract:
Radio Frequency Identification (RFID) tags are remotely-powered data carriers that augment physical objects with wireless computing abilities. This allows us to create smart homes and offices, optimize our supply chains, and keep a watchful eye on our pets, livestock, and kids. But unfortunately, RFID security and privacy issues have been addressed as an afterthought; it is regretfully easy to interfere with RFID systems, as many rely upon the integrity of RFID tag data for their correct functioning. To illustrate these problems, we have built a handheld device that performs RFID tag spoofing and selective RFID tag jamming (a bit like an “RFID firewall”). Compatible with the ISO 15693/14443 13.56 MHz RFID standards, our device is battery-powered and fits into a shirt pocket. This presentation will explain the “nuts and bolts” of RFID tag spoofing and jamming attacks, and will conclude with a live practical demonstration of these attacks.

For more information visit: http://bit.ly/defcon14_information
To download the video visit: http://bit.ly/defcon14_videos


- Post Time: 09-01-16 - By: http://www.rfidang.com