Attacks on Mobile Phones that Use the Vulnerability of NFC Technology

The article reviews the NFC technology, which is becoming more popular all over the world. The authors study the vulnerabilities of the standard that allow different types of fraud and provide the examples of attacks aimed at obtaining funds from the subscriber’s account, the contamination of mobile...

Full description

Bibliographic Details
Main Authors: A. V. Starikovskiy, A. V. Zuykov, M. S. Aristov, D. A. Stepanyan
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2012-09-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
NFC
Online Access:https://bit.mephi.ru/index.php/bit/article/view/456