Title: On the security issues of NFC enabled mobile phones

Authors: Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis

Addresses: Information Security Group, Smart Card Centre, Royal Holloway University of London, Egham Hill, TW20 0EX, Surrey, UK. ' Information Security Group, Smart Card Centre, Royal Holloway University of London, Egham Hill, TW20 0EX, Surrey, UK. ' Information Security Group, Smart Card Centre, Royal Holloway University of London, Egham Hill, TW20 0EX, Surrey, UK. ' Information Security Group, Smart Card Centre, Royal Holloway University of London, Egham Hill, TW20 0EX, Surrey, UK

Abstract: In this paper, we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded secure element (SE), could be used as a mobile token cloning and skimming platform. We show how an attacker could use an NFC mobile phone as such an attack platform by exploiting the existing security controls of the embedded SE and the available contactless APIs. To illustrate the feasibility of these actions, we also show how to practically skim and emulate certain tokens typically used in payment and access control applications with a NFC mobile phone. We also discuss how to capture and analyse legitimate transaction information from contactless systems. Although such attacks can also be implemented on other contactless platforms, such as custom-built card emulators and modified readers, the NFC enabled mobile phone has a legitimate form factor, which would be accepted by merchants and arouse less suspicion in public. Finally, we propose several security countermeasures for NFC phones that could prevent such misuse.

Keywords: near field communication; NFC mobile phones; security threats; skimming attacks; cloning attacks; secure elements; security countermeasures; cell phones.

DOI: 10.1504/IJITST.2010.037408

International Journal of Internet Technology and Secured Transactions, 2010 Vol.2 No.3/4, pp.336 - 356

Published online: 06 Dec 2010 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article