RFID Malware: Design Principles and Examples

M.R. Rieback, P.N.D. Simpson, B. Crispo, A.S. Tanenbaum

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

This paper explores the concept of malware for Radio Frequency Identification (RFID) systems - including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID virus. The various RFID malware approaches are then analyzed for their effectiveness across a range of target platforms. This paper concludes by warning RFID middleware developers to build appropriate checks into their RFID middleware before it achieves wide-scale deployment in the real world. © 2006 Elsevier Ltd. All rights reserved.
Original languageEnglish
Pages (from-to)405-426
Number of pages22
JournalPervasive and Mobile Computing
Volume2
Issue number4
DOIs
Publication statusPublished - Nov 2006

Keywords

  • Exploit
  • Malware
  • Radio Frequency Identification
  • RFID
  • Security
  • Virus
  • Worm

Fingerprint

Dive into the research topics of 'RFID Malware: Design Principles and Examples'. Together they form a unique fingerprint.

Cite this