Security of Near Field Communication: Does My Phone Need A Tinfoil Hat?
Thomas Harren
University of Minnesota, Morris
April 30, 2015
1 / 45
Security of Near Field Communication: Does My Phone Need A Tinfoil - - PowerPoint PPT Presentation
Security of Near Field Communication: Does My Phone Need A Tinfoil Hat? Thomas Harren University of Minnesota, Morris April 30, 2015 1 / 45 Have you used NFC? Note: The communication standard used in UCard was not verifjed 2 / 45 1 meter
University of Minnesota, Morris
1 / 45
2 / 45 Note: The communication standard used in UCard was not verifjed
3 / 45
3 / 45
4 / 45
5 / 45
Background 6 / 45
Background Elements of RFID: Tags & Readers 7 / 45
Background Elements of RFID: Tags & Readers 7 / 45
Background Elements of RFID: Tags & Readers 7 / 45
Background Elements of RFID: Tags & Readers 8 / 45
Background Elements of RFID: Tags & Readers 8 / 45
1
2
3
4
Background Elements of RFID: Tags & Readers 9 / 45
1
2
3
4
Background Elements of RFID: Tags & Readers 9 / 45
1
2
3
4
Background Elements of RFID: Tags & Readers 9 / 45
1
2
3
4
Background Elements of RFID: Tags & Readers 9 / 45
1
2
3
4
Background Elements of RFID: Tags & Readers 9 / 45
1
2
3
Background NFC on Mobile Phones 10 / 45
Background NFC on Mobile Phones 11 / 45 Image from Hardy 2010
Background NFC on Mobile Phones 11 / 45 Image from Hardy 2010
Background NFC on Mobile Phones 11 / 45 Image from Hardy 2010
Background NFC on Mobile Phones 12 / 45 Image Note: Thank you Evan
Background NFC on Mobile Phones 12 / 45 Image Note: Thank you Evan
Background NFC on Mobile Phones 13 / 45 Image Note: Thank you Jacob and Maggie
Background NFC on Mobile Phones 13 / 45 Image Note: Thank you Jacob and Maggie
Background NFC on Mobile Phones 13 / 45 Image Note: Thank you Jacob and Maggie
1
2
Background Security for NFC 14 / 45
Contactless Credit Cards Current Credit Card Protocol 15 / 45
Contactless Credit Cards Current Credit Card Protocol 16 / 45
Contactless Credit Cards Current Credit Card Protocol 16 / 45
Contactless Credit Cards Current Credit Card Protocol 16 / 45
Contactless Credit Cards Current Credit Card Protocol 17 / 45
Contactless Credit Cards Current Credit Card Protocol 18 / 45
Contactless Credit Cards Current Credit Card Protocol 18 / 45
Contactless Credit Cards Current Credit Card Protocol 18 / 45
Contactless Credit Cards Current Credit Card Protocol 18 / 45
Contactless Credit Cards Current Credit Card Protocol 18 / 45
Contactless Credit Cards Credit Card Attacks 19 / 45 Photo of eavesdropper from Flicker
Contactless Credit Cards Credit Card Attacks 19 / 45 Photo of eavesdropper from Flicker
Contactless Credit Cards Credit Card Attacks 19 / 45 Photo of eavesdropper from Flicker
Contactless Credit Cards Credit Card Attacks 20 / 45
Contactless Credit Cards Credit Card Attacks 20 / 45
Contactless Credit Cards Credit Card Attacks 21 / 45
Contactless Credit Cards Credit Card Attacks 21 / 45
Contactless Credit Cards Credit Card Attacks 21 / 45
Contactless Credit Cards Credit Card Attacks 21 / 45
Contactless Credit Cards Credit Card Attacks 21 / 45
Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45
Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45
Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45
Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45
1
2
Contactless Credit Cards Proposed Secure Credit Card Protocol 23 / 45
1
2
Contactless Credit Cards Proposed Secure Credit Card Protocol 23 / 45
1
2
Contactless Credit Cards Proposed Secure Credit Card Protocol 23 / 45
NFC and Mass Transit Ticketing 24 / 45
NFC and Mass Transit Ticketing 25 / 45
NFC and Mass Transit Ticketing 25 / 45
NFC and Mass Transit Ticketing 25 / 45
NFC and Mass Transit Ticketing 25 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 28 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 28 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 28 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 29 / 45
NFC and Mass Transit Ticketing Ticketing Protocols 29 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45
NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45
EnGarde: Physical NFC Security 32 / 45
EnGarde: Physical NFC Security 33 / 45
EnGarde: Physical NFC Security 33 / 45
EnGarde: Physical NFC Security 33 / 45
EnGarde: Physical NFC Security 33 / 45
EnGarde: Physical NFC Security The Engarde Protoype 34 / 45
EnGarde: Physical NFC Security The Engarde Protoype 34 / 45
EnGarde: Physical NFC Security The Engarde Protoype 34 / 45
EnGarde: Physical NFC Security The Engarde Protoype 34 / 45
EnGarde: Physical NFC Security The Engarde Protoype 34 / 45
EnGarde: Physical NFC Security The Engarde Protoype 35 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 36 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 36 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 37 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 37 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 37 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 38 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 38 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 38 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 39 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 39 / 45
EnGarde: Physical NFC Security NFC Decoding and Jamming 39 / 45
EnGarde: Physical NFC Security Experimental Evaluation 40 / 45
EnGarde: Physical NFC Security Experimental Evaluation 40 / 45
EnGarde: Physical NFC Security Experimental Evaluation 40 / 45
Conclusion 41 / 45
Conclusion 42 / 45
Conclusion 42 / 45
Conclusion 42 / 45
Conclusion 42 / 45
Conclusion 42 / 45
Conclusion 43 / 45
1
2
3
Conclusion 44 / 45
Conclusion 45 / 45