Research of discovering vulnerabilities of NFC applications on Android platform
Zhi-qiang WANG1,Qi-xu LIU2,Yu-qing ZHANG2
1 State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China 2 National Computer Network Intrusion Protection Center,University of Chinese Academy of Sciences,Beijing 101408,China
Online:2014-11-25
Published:2017-06-19
Supported by:
The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Development and Reform Commission Special Notice of Information Security
Zhi-qiang WANG,Qi-xu LIU,Yu-qing ZHANG. Research of discovering vulnerabilities of NFC applications on Android platform[J]. Journal on Communications, 2014, 35(Z2): 117-123.
MADLMAYR G , KANTNER C , GRECHENIG T . Secure Smart Embedded Devices,Platforms and Applications[M]. New York: SpringerPress, 2014: 351-367.
[2]
COSKUN V , OZDENIZCI B , OK K . A survey on near field communication (NFC) technology[J]. Wireless Personal Communications, 2013,71(3): 2259-2294.
[3]
MULLINER C . Vulnerability analysis and attacks on NFC-enabled mobile phones[A]. Proceedings of the 2009 IEEE International Conference on Availability,Reliability and Security(ARES'09)[C]. Fukuoka,Japan, 2009. 695-700.
[4]
MILLER C . Exploring the NFC attack surface[EB/OL]. .
[5]
WIEDERMANN N . Fuzzing-to-go:A test framework for Android devices[D]. Technische Universit?t München, 2012.
[6]
GUMMESON J J , PRIYANTHA B , GANESAN D ,et al. EnGarde:Protecting the mobile phone from malicious NFC interactions[A]. Proceeding of the 11th ACM annual international conference on Mobile systems,applications,and services(MobiSys’13)[C]. Taipei,China, 2013. 445-458.
[7]
NFC Forum . NFC Data Exchange Format (NDEF) Technical Specification[S]. 2006.
[8]
SUTTON M , GREENE A , AMINI P . Fuzzing:brute force vulnerability discovery[M]. New Jersey: Pearson EducationPress, 2007.