language-icon Old Web
English
Sign In

RFID malware fragmentation attacks

2008 
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of service attack, or even a buffer overflow. This paper deals with fragmentation attacks, a new type of attack that can be done on a database. Fragmentation attacks are performed using RFID as carriers. This paper is an extension of our previous work. A contactless RFID reader and an array of 2048-byte tags are used for our experiments. In another related work, an attack using a self-referential query was done on Linux, Oracle, and PHP/SSI. Here, we will discuss possible attacks over the middleware systems, its implementation on RFID, the consequences of fragmentation attacks, and other possible attacks using RFID.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    5
    References
    10
    Citations
    NaN
    KQI
    []