RFID malware fragmentation attacks
2008
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of service attack, or even a buffer overflow. This paper deals with fragmentation attacks, a new type of attack that can be done on a database. Fragmentation attacks are performed using RFID as carriers. This paper is an extension of our previous work. A contactless RFID reader and an array of 2048-byte tags are used for our experiments. In another related work, an attack using a self-referential query was done on Linux, Oracle, and PHP/SSI. Here, we will discuss possible attacks over the middleware systems, its implementation on RFID, the consequences of fragmentation attacks, and other possible attacks using RFID.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
5
References
10
Citations
NaN
KQI