25C3 - 1.4.2.3
25th Chaos Communication Congress
Nothing to hide
Speakers | |
---|---|
Collin Mulliner |
Schedule | |
---|---|
Day | Day 3 (2008-12-29) |
Room | Saal 1 |
Start time | 18:30 |
Duration | 01:00 |
Info | |
ID | 2639 |
Event type | lecture |
Track | Hacking |
Language used for presentation | en |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Attacking NFC mobile phones
First look at the security of NFC mobile phones
Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselves.
The presentation will provide this first look at the security of NFC mobile phones. We will show some known theoretical attacks and how they may work in the field. Further we will present results from analyzing a specific NFC mobile phone, here we will reveal some security issues and methods to exploit them. Also we will provide a small survey of NFC applications in the field. Finally we will release a small set of tools to do further analysis on NFC mobile phones and applications.
If you have an NFC mobile phone I kindly ask you to bring it to the congress and come to me before or after my talk and show it to me, thanks!