EnGarde: protecting the mobile phone from malicious NFC interactions

@inproceedings{Gummeson2013EnGardePT,
  title={EnGarde: protecting the mobile phone from malicious NFC interactions},
  author={Jeremy Gummeson and Bodhi Priyantha and Deepak Ganesan and Derek Thrasher and Pengyu Zhang},
  booktitle={MobiSys},
  year={2013}
}
Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include malicious NFC tags that seek to compromise a mobile phone, malicious readers that try to generate fake mobile payment transactions or steal valuable financial information, and others. In this work, we look at how to protect mobile phones from… CONTINUE READING

Similar Papers

Figures, Tables, Results, and Topics from this paper.

Key Quantitative Results

  • We can jam tag responses with 100% success rate while consuming only 6.4 µW of power, which is considerably more e.cient than prior approaches that have used active jamming. . We can accurately detect tag presence with an accu­racy of 95% under a wide range of conditions, while having negligible impact on legitimate communications. .

Citations

Publications citing this paper.
SHOWING 1-10 OF 15 CITATIONS

References

Publications referenced by this paper.