Corpus ID: 11507747

Trojan of Things: Embedding Malicious NFC Tags into Common Objects

@article{Maruyama2017TrojanOT,
  title={Trojan of Things: Embedding Malicious NFC Tags into Common Objects},
  author={S. Maruyama and Satohiro Wakabayashi and T. Mori},
  journal={ArXiv},
  year={2017},
  volume={abs/1702.07124}
}
  • S. Maruyama, Satohiro Wakabayashi, T. Mori
  • Published 2017
  • Computer Science
  • ArXiv
  • We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFC- enabled mobile devices such as smartphones. [...] Key Method To fully explore the threat of ToT, we develop two striking techniques named ToT device and Phantom touch generator. These techniques enable an attacker to carry out various severe and sophisticated attacks unbeknownst to the device owner who unintentionally puts the device close to a ToT. We discuss the feasibility of the attack as well as the possible…Expand Abstract
    2 Citations
    Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags
    • C. Bermejo, P. Hui
    • Computer Science
    • 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
    • 2020
    • 6
    • PDF

    References

    SHOWING 1-10 OF 32 REFERENCES
    Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
    • Collin Mulliner
    • Computer Science
    • 2009 International Conference on Availability, Reliability and Security
    • 2009
    • 158
    • PDF
    Practical Attacks on NFC Enabled Cell Phones
    • 71
    • PDF
    A testbed for modeling and detecting attacks on NFC enabled mobile devices
    • 4
    A fast eavesdropping attack against touchscreens
    • 68
    • PDF
    Is your cat infected with a computer virus?
    • 236
    • PDF
    Vulnerabilities in First-Generation RFID-Enabled Credit Cards
    • 135
    • PDF