Presented at
REcon 2011,
July 9, 2011, 1 p.m.
(60 minutes).
In the last years RFID did become a ubiquitous part of our life. We are
confronted daily with RFID applications in access control systems, as
micro-payment, in electronic IDs and public transportation. Despite of
the huge impact, still very little is known on many systems out there -
questions on security and privacy features remain unanswered by most
system vendors.
This talks explains how black box RFID systems can be analyzed and
reverse engineered to understand the protocols and inner workings of
unkown RFID systems. It explains the tools used and presents weak spots
and the resulting approaches and for an effective reverse-engineering.
Presenters:
Links:
Similar Presentations: