• About
  • Advertise
  • Contact
Friday, April 24, 2026
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Networking

RFID tags are subject to viruses, study says

in Networking
0 0
0
SHARES
9
VIEWS
Share on FacebookShare on Twitter

RFID tags are subject to viruses, study saysThree computer science researchers are warning that viruses embedded in radio tags used to identify and track goods are right around the corner, a danger so far overlooked by the industry’s high interest in the technology.

No radio frequency identification (RFID) viruses have been released live of now, according to the researchers at Vrije Universiteit Amsterdam in the Netherlands. But RFID tags have several characteristics that could be engineered to exploit vulnerabilities in middleware and back-end databases, they wrote in a paper presented Wednesday at a conference in Pisa, Italy

“RFID malware is a Pandora’s box that has been gathering dust in the corner of our ‘smart’ warehouses and home,” the paper stated.

The attacks can come in the form of a SQL injection or a buffer overflow attack even though the tags themselves may only store a small bit of information, the paper said. For demonstration purposes, the researchers created a proof-of-concept, self-replicating RFID virus.

It only took a master’s student at the university, Patrick Simpson, four hours to write a virus small enough to fit on an RFID tag, something previously thought unworkable, said Andrew S. Tanenbaum, a professor at Vrije Universiteit Amsterdam. RFID tags can contain as little as 114 bytes of memory, he said.

Tanenbaum expects vendors to be angry about the publishing of the code. Vendors have dismissed the possibility of RFID viruses, saying that the amount of memory in the tags is too small, he said.

“You publish all of the code on the Web site, and all of [a] sudden, [vendors] are going to start panicking,” Tanenbaum said. “This hopefully will make them take it seriously. This is a wake-up shot before this stuff is deployed in a large scale.”

But the researchers did take precautions to ensure RFID viruses won’t immediately circulate. They wrote their own middleware that mimicked traits of products on the market, said Melanie Rieback, one of the paper’s authors.

“It’s not like we are providing a cookbook for basically wanna-be hackers to hack real RFID systems,” Rieback said.

The homespun middleware connected to back-end databases from vendors such as Oracle and Microsoft along with open source databases such as MySQL and Postgres, Rieback said. The experiment used RFID equipment from Philips Electronics NV, she said.

“It was actually quite interesting to see that some of the databases were susceptible to some kinds of attacks,” Rieback said. “Other ones actually had natural protection mechanisms built in that made them more resistant.”

The purpose of the exercise, the authors wrote, is to encourage RFID middleware designers to be more careful when writing code. Back-end middleware can contain millions of lines of source code, and if software faults number between six to 16 per 1,000 lines of code, the programs are like to have many vulnerabilities, the paper said.

RFID tags are increasingly being used in a variety of industries to track items and give a real-time view of inventories. The tags contain data on a particular object or, in some cases, embedded in animals, and that data is typically stored in a database.

Companies can save money by using the tags to keep closer tabs on their property. However, this “pervasive computing utopia has its dark side,” the authors wrote.

RFID systems may be attractive to criminals since the data contained on them may have a financial or personal nature, such as information stored on digital passports. In addition to causing damage to computer systems, RFID malware may have an effect on real-world objects, the paper said.

Airports are looking to RFID tags to better track baggage. But Tanenbaum warned that this application could pose a large problem if an RFID tag is read and delivers a much larger set of data in return.

A false tag on a piece of baggage could exploit a buffer overflow, delivering a virus to the RFID middleware, according to Tanenbaum. Once the virus code is on the server, it can infect the databases and corrupt subsequent tags or install “backdoors” – small programs that allow for the extrication of data over the Internet, he said.

“You can hide baggage,” Tanenbaum said. “You can reroute baggage to the wrong place – all kinds of mischief. That’s I think a very, very serious thing that even has national security implications.”

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2006 IDG Communications, Inc.

Download WordPress Themes Free
Download Premium WordPress Themes Free
Free Download WordPress Themes
Download Best WordPress Themes Free Download
udemy course download free
download samsung firmware
Download WordPress Themes
udemy course download free
Tags: RFID tags are subject to virusesstudy says
Next Post

Security wins at German soccer stadium

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In