Trojan of Things: Embedding Malicious NFC Tags into Common Objects
@article{Maruyama2017TrojanOT, title={Trojan of Things: Embedding Malicious NFC Tags into Common Objects}, author={S. Maruyama and Satohiro Wakabayashi and T. Mori}, journal={ArXiv}, year={2017}, volume={abs/1702.07124} }
We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFC- enabled mobile devices such as smartphones. [...] Key Method To fully explore the threat of ToT, we develop two striking techniques named ToT device and Phantom touch generator. These techniques enable an attacker to carry out various severe and sophisticated attacks unbeknownst to the device owner who unintentionally puts the device close to a ToT. We discuss the feasibility of the attack as well as the possible…Expand Abstract
Figures, Tables, and Topics from this paper
2 Citations
Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags
- Computer Science
- 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
- 2020
- 6
- PDF
References
SHOWING 1-10 OF 32 REFERENCES
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
- Computer Science
- 2009 International Conference on Availability, Reliability and Security
- 2009
- 158
- PDF
Practical Attacks on NFC Enabled Cell Phones
- Engineering
- 2011 Third International Workshop on Near Field Communication
- 2011
- 71
- PDF
A testbed for modeling and detecting attacks on NFC enabled mobile devices
- Engineering, Computer Science
- MILCOM 2015 - 2015 IEEE Military Communications Conference
- 2015
- 4
A fast eavesdropping attack against touchscreens
- Computer Science
- 2011 7th International Conference on Information Assurance and Security (IAS)
- 2011
- 68
- PDF
RFIDs and secret handshakes: defending against ghost-and-leech attacks and unauthorized reads with context-aware communications
- Computer Science
- CCS
- 2008
- 111
- PDF
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
- Computer Science, Engineering
- NDSS
- 2011
- 323
- PDF
Is your cat infected with a computer virus?
- Computer Science
- Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06)
- 2006
- 236
- PDF
Vulnerabilities in First-Generation RFID-Enabled Credit Cards
- Computer Science
- Financial Cryptography
- 2007
- 135
- PDF