Безопасность информационных технологий (Sep 2012)

Attacks on Mobile Phones that Use the Vulnerability of NFC Technology

  • A. V. Starikovskiy,
  • A. V. Zuykov,
  • M. S. Aristov,
  • D. A. Stepanyan

Journal volume & issue
Vol. 19, no. 2S
pp. 60 – 64

Abstract

Read online

The article reviews the NFC technology, which is becoming more popular all over the world. The authors study the vulnerabilities of the standard that allow different types of fraud and provide the examples of attacks aimed at obtaining funds from the subscriber’s account, the contamination of mobile phone with malware, as well as the output device failure.

Keywords