{"id":"https://openalex.org/W2165376769","doi":"https://doi.org/10.1109/icitst.2009.5402513","title":"Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms","display_name":"Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2165376769","doi":"https://doi.org/10.1109/icitst.2009.5402513","mag":"2165376769"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2009.5402513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076599658","display_name":"Leslie P. Francis","orcid":"https://orcid.org/0000-0002-7356-3459"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"L. Francis","raw_affiliation_strings":["The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK"],"affiliations":[{"raw_affiliation_string":"The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019818778","display_name":"Gerhard P. Hancke","orcid":"https://orcid.org/0000-0002-2388-3542"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"G. Hancke","raw_affiliation_strings":["The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK"],"affiliations":[{"raw_affiliation_string":"The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074962907","display_name":"Keith Mayes","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"K. Mayes","raw_affiliation_strings":["The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK"],"affiliations":[{"raw_affiliation_string":"The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025799420","display_name":"Konstantinos Markantonakis","orcid":"https://orcid.org/0000-0003-3975-9033"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"K. Markantonakis","raw_affiliation_strings":["The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK"],"affiliations":[{"raw_affiliation_string":"The Information Security Group, Smart Card Centre,Royal Holloway, University of London, Egham Hill, Surrey, UK","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076599658"],"corresponding_institution_ids":["https://openalex.org/I184558857"],"apc_list":null,"apc_paid":null,"fwci":7.403,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.97187638,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.8134193420410156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7315828800201416},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.726883053779602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6645258665084839},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.6522213220596313},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.5883679389953613},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5048380494117737},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.45896008610725403},{"id":"https://openalex.org/keywords/mobile-payment","display_name":"Mobile payment","score":0.44320523738861084},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.34423118829727173},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27524176239967346},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.232150137424469},{"id":"https://openalex.org/keywords/handset","display_name":"Handset","score":0.21607503294944763},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11534622311592102}],"concepts":[{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.8134193420410156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7315828800201416},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.726883053779602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6645258665084839},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.6522213220596313},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.5883679389953613},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5048380494117737},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.45896008610725403},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.44320523738861084},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.34423118829727173},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27524176239967346},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.232150137424469},{"id":"https://openalex.org/C2779971919","wikidata":"https://www.wikidata.org/wiki/Q1378949","display_name":"Handset","level":2,"score":0.21607503294944763},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11534622311592102},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2009.5402513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2009.5402513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1488608415"],"related_works":["https://openalex.org/W2120719751","https://openalex.org/W2356606423","https://openalex.org/W4238025070","https://openalex.org/W2511249548","https://openalex.org/W2952760203","https://openalex.org/W2187450023","https://openalex.org/W2017865814","https://openalex.org/W2100107174","https://openalex.org/W4239141680","https://openalex.org/W2511353779"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,71,136],"investigate":[4],"the":[5,51,56,60,66,114],"possibility":[6],"that":[7,144],"a":[8,26,40,91,119],"Near":[9],"Field":[10],"Communication":[11],"(NFC)":[12],"enabled":[13],"mobile":[14,27,42,93,116],"phone,":[15],"with":[16,90],"an":[17,36,46],"embedded":[18,57],"Secure":[19],"Element":[20],"(SE),":[21],"could":[22,38,145],"be":[23,100,125],"used":[24,83],"as":[25,44,107],"token":[28],"cloning":[29],"and":[30,59,78,86,111,129],"skimming":[31],"platform.":[32],"We":[33],"show":[34,73],"how":[35,74],"attacker":[37],"use":[39],"NFC":[41,92,142],"phone":[43,117],"such":[45,96,106,147],"attack":[47],"platform":[48],"by":[49,127],"exploiting":[50],"existing":[52],"security":[53,139],"controls":[54],"of":[55,68],"SE":[58],"available":[61],"contactless":[62,104],"APIs.":[63],"To":[64],"illustrate":[65],"feasibility":[67],"these":[69],"actions":[70],"also":[72,99],"to":[75],"practically":[76],"skim":[77],"emulate":[79],"certain":[80],"tokens":[81],"typically":[82],"in":[84,133],"payment":[85],"access":[87],"control":[88],"applications":[89],"phone.":[94],"Although":[95],"attacks":[97],"can":[98],"implemented":[101],"on":[102],"other":[103],"platforms,":[105],"custom-built":[108],"card":[109],"emulators":[110],"modified":[112],"readers,":[113],"NFC-enabled":[115],"has":[118],"legitimate":[120],"form":[121],"factor,":[122],"which":[123],"would":[124],"accepted":[126],"merchants":[128],"arouse":[130],"less":[131],"suspicion":[132],"public.":[134],"Finally,":[135],"propose":[137],"several":[138],"countermeasures":[140],"for":[141],"phones":[143],"prevent":[146],"misuse.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
