{"id":"https://openalex.org/W2147522514","doi":"https://doi.org/10.5220/0005477506850700","title":"Organisational Aspects and Anatomy of an Attack on NFC/HCE Mobile Payment Systems","display_name":"Organisational Aspects and Anatomy of an Attack on NFC/HCE Mobile Payment Systems","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2147522514","doi":"https://doi.org/10.5220/0005477506850700","mag":"2147522514"},"language":"en","primary_location":{"id":"doi:10.5220/0005477506850700","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005477506850700","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005477506850700","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114374295","display_name":"Maurizio Cavallari","orcid":"https://orcid.org/0000-0003-0970-8227"},"institutions":[{"id":"https://openalex.org/I103320735","display_name":"Universit\u00e0 Cattolica del Sacro Cuore","ror":"https://ror.org/03h7r5v07","country_code":"IT","type":"education","lineage":["https://openalex.org/I103320735"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Maurizio Cavallari","raw_affiliation_strings":["Universit\u00e0 Cattolica del Sacro Cuore, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 Cattolica del Sacro Cuore, Italy","institution_ids":["https://openalex.org/I103320735"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057986857","display_name":"Luca Adami","orcid":"https://orcid.org/0000-0003-2645-8725"},"institutions":[{"id":"https://openalex.org/I103320735","display_name":"Universit\u00e0 Cattolica del Sacro Cuore","ror":"https://ror.org/03h7r5v07","country_code":"IT","type":"education","lineage":["https://openalex.org/I103320735"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Adami","raw_affiliation_strings":["Universit\u00e0 Cattolica del Sacro Cuore, Italy"],"affiliations":[{"raw_affiliation_string":"Universit\u00e0 Cattolica del Sacro Cuore, Italy","institution_ids":["https://openalex.org/I103320735"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018174547","display_name":"Francesco Tornieri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Francesco Tornieri","raw_affiliation_strings":["BKG Laboratories, Italy"],"affiliations":[{"raw_affiliation_string":"BKG Laboratories, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5114374295"],"corresponding_institution_ids":["https://openalex.org/I103320735"],"apc_list":null,"apc_paid":null,"fwci":2.1047,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89493817,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"685","last_page":"700"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/near-field-communication","display_name":"Near field communication","score":0.7365034818649292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7024751901626587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6719733476638794},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5379660129547119},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5235347747802734},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.5022375583648682},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.48610591888427734},{"id":"https://openalex.org/keywords/mobile-payment","display_name":"Mobile payment","score":0.4727017879486084},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4501839876174927},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4456506371498108},{"id":"https://openalex.org/keywords/payment-card","display_name":"Payment card","score":0.43979692459106445},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.4304758310317993},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18658438324928284},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14617004990577698},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14361751079559326}],"concepts":[{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.7365034818649292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7024751901626587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6719733476638794},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5379660129547119},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5235347747802734},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.5022375583648682},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.48610591888427734},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.4727017879486084},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4501839876174927},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4456506371498108},{"id":"https://openalex.org/C21021354","wikidata":"https://www.wikidata.org/wiki/Q1207171","display_name":"Payment card","level":3,"score":0.43979692459106445},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.4304758310317993},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18658438324928284},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14617004990577698},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14361751079559326},{"id":"https://openalex.org/C96122199","wikidata":"https://www.wikidata.org/wiki/Q628096","display_name":"Ultra high frequency","level":2,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005477506850700","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005477506850700","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005477506850700","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005477506850700","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Enterprise Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W34446344","https://openalex.org/W114504430","https://openalex.org/W1522971697","https://openalex.org/W1790746625","https://openalex.org/W1963860253","https://openalex.org/W2092433168","https://openalex.org/W2100807224","https://openalex.org/W2128500420","https://openalex.org/W2133264957","https://openalex.org/W2137650964","https://openalex.org/W2142344425","https://openalex.org/W2159566525","https://openalex.org/W2160584199","https://openalex.org/W2462310946"],"related_works":["https://openalex.org/W2120719751","https://openalex.org/W2356606423","https://openalex.org/W4238025070","https://openalex.org/W3121451588","https://openalex.org/W2511249548","https://openalex.org/W2952760203","https://openalex.org/W2187450023","https://openalex.org/W2511353779","https://openalex.org/W2465219669","https://openalex.org/W2017865814"],"abstract_inverted_index":{"Near":[0],"Field":[1],"Communication":[2],"(NFC)":[3],"and":[4,12,30,41,58,143,166],"contactless":[5],"applications":[6,39],"are":[7,27,183],"increasing":[8,29],"at":[9],"unprecedented":[10],"rate":[11],"their":[13],"value":[14,36,63],"is":[15,67,93],"being":[16],"recognised":[17],"by":[18],"the":[19,34,51,65,70,78,86,99,115,122],"financial":[20,81],"industry":[21],"(Ok":[22],"et":[23],"al.,":[24],"2011).":[25],"Attacks":[26],"also":[28],"they":[31],"can":[32],"compromise":[33],"business":[35],"on":[37],"NFC":[38],"(Murdoch":[40],"Anderson,":[42],"2010,":[43],"Trend":[44],"Micro,":[45],"2015).":[46],"The":[47,62,136],"present":[48],"paper":[49,66,137],"analyse":[50],"anatomy":[52],"of":[53,64,75,101,105,134,159,162,171],"possible":[54,60],"attacks,":[55],"uncovering":[56],"vulnerabilities":[57,142,170],"suggesting":[59],"countermeasures.":[61],"found":[68],"in":[69,77,121,131,156],"contribution":[71],"to":[72,85,152,185,191],"practical":[73],"mitigation":[74],"risk":[76],"mobile":[79],"payment":[80],"business,":[82],"with":[83,188],"respect":[84],"technology":[87,95],"side.":[88],"Host":[89],"Card":[90],"Emulation":[91],"(HCE)":[92],"a":[94,102,106,132,147],"solution":[96],"that":[97,178],"permits":[98],"creation":[100],"virtual":[103],"representation":[104],"smart":[107],"card":[108],"using":[109],"only":[110],"software":[111],"components,":[112],"effectively":[113],"eliminating":[114],"need":[116],"for":[117],"Secure":[118],"Element":[119],"hardware":[120],"device.":[123],"NFC/HCE":[124],"technologies":[125],"has":[126],"proved":[127,181],"itself":[128],"very":[129],"vulnerable":[130,144],"variety":[133],"aspects.":[135],"would":[138],"go":[139],"through":[140],"specific":[141,169],"situation,":[145],"like:":[146],"non-secure-device/cloud":[148],"communication":[149],"channel;":[150],"access":[151],"data":[153],"saved":[154],"locally":[155],"wallet;":[157],"reusability":[158],"token;":[160],"use":[161],"fake":[163,167],"POS;":[164],"malware":[165],"application;":[168],"\u00e2\u0080\u009cTap":[172],"&":[173],"Pay\u00e2\u0080\u009d;":[174],"device/cloud":[175],"decoupling.":[176],"Countermeasures":[177],"have":[179],"been":[180],"effective":[182],"offered":[184],"readers":[186],"along":[187],"Organisational":[189],"aspects":[190],"be":[192],"taken":[193],"into":[194],"account.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
