메뉴 건너뛰기




Volumn 2, Issue 4, 2006, Pages 405-426

RFID malware: Design principles and examples

Author keywords

Exploit; Malware; Radio Frequency Identification; RFID; Security; Virus; Worm

Indexed keywords

COMPUTER VIRUSES; COMPUTER WORMS; REAL TIME SYSTEMS; SECURITY OF DATA;

EID: 33749663423     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2006.07.008     Document Type: Article
Times cited : (50)

References (21)
  • 1
    • 0001853125 scopus 로고
    • The computer for the twenty-first century
    • Weiser M. The computer for the twenty-first century. Scientific American (1991) 94-100
    • (1991) Scientific American , pp. 94-100
    • Weiser, M.1
  • 2
    • 33749657070 scopus 로고    scopus 로고
    • J. Ditlev, Rest in peace, in: RFID Buzz. http://www.rfidbuzz.com/news/2005/rest_in_peace.html
  • 3
    • 33749670937 scopus 로고    scopus 로고
    • International Civil Aviation Organization, Biometrics deployment of machine readable travel documents, 2004. http://www.icao.int/mrtd/download/documents/Biometrics%20deployment%20of%20Machine%20Readable%20Travel%20Documents%202004.pdf
  • 4
    • 84877887414 scopus 로고    scopus 로고
    • S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, M. Szydlo, Security analysis of a cryptographically-enabled RFID device, in: 14th USENIX Security Symposium, USENIX, Baltimore, Maryland, USA, 2005, pp. 1-16
  • 5
    • 33847269759 scopus 로고    scopus 로고
    • Z. Kfir, A. Wool, Picking virtual pockets using relay attacks on contactless smartcard systems, in: 1st Intl. Conf. on Security and Privacy for Emerging Areas in Communication Networks, 2005
  • 6
    • 0021122553 scopus 로고
    • Software errors and complexity: An empirical investigation
    • Basili V.R., and Perricone B.T. Software errors and complexity: An empirical investigation. Communications of the ACM 27 1 (1984) 42-52
    • (1984) Communications of the ACM , vol.27 , Issue.1 , pp. 42-52
    • Basili, V.R.1    Perricone, B.T.2
  • 7
    • 12244311689 scopus 로고    scopus 로고
    • N. Weaver, V. Paxson, S. Staniford, R. Cunningham, A taxonomy of computer worms, in: First Workshop on Rapid Malcode, WORM, 2003
  • 8
    • 33749670932 scopus 로고    scopus 로고
    • C. Anley, Advanced SQL injection in SQL Server applications. http://www.nextgenss.com/papers/advanced_sql_injection.pdf
  • 9
    • 33749670933 scopus 로고    scopus 로고
    • Microsoft Corporation, How to prevent cross-site scripting security issues. http://support.microsoft.com/default.aspx?scid=kb;en-us;Q252985
  • 10
    • 33749657069 scopus 로고    scopus 로고
    • US-CERT, Vulnerability Note VU#181038 - Microsoft Windows Metafile handler SETABORTPROC GDI Escape Vulnerability
  • 11
    • 33749657068 scopus 로고    scopus 로고
    • K. Sitaker, How to find security holes. http://www.canonical.org/~kragen/security-holes.html
  • 13
    • 33749657072 scopus 로고    scopus 로고
    • D.R. Hofstadter, Godel, Escher, Bach: An Eternal Golden Braid, Basic Books, Inc., New York, NY, USA, 1979
  • 14
    • 33749657071 scopus 로고    scopus 로고
    • N. Jorgensen, Self documenting program in SQL. http://www.droptable. com/archive478-2005-5-25456.html
  • 15
    • 33749670935 scopus 로고    scopus 로고
    • D. Madore, Quines (self-replicating programs). http://www.madore.org/~david/computers/quine.html
  • 16
    • 33749670936 scopus 로고    scopus 로고
    • D. Rajesh, Advanced concepts to prevent SQL injection. http://www.csharpcorner.com/UploadFile/rajeshdg/Page107142005052957AM/Page1.aspx?ArticleID=631d8221-64ed-4db7-b81b-8ba3082cb496
  • 17
    • 16244366310 scopus 로고    scopus 로고
    • N. Nethercote, J. Seward, Valgrind: A program supervision framework, Electronic Notes in Theoretical Computer Science 89 (2)
  • 18
    • 33749663876 scopus 로고    scopus 로고
    • B. Perens, Electric fence. http://perens.com/FreeSoftware/ElectricFence/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.