{"id":405,"date":"2006-03-15T13:34:38","date_gmt":"2006-03-15T21:34:38","guid":{"rendered":"\/?p=405"},"modified":"2006-03-16T03:21:19","modified_gmt":"2006-03-16T11:21:19","slug":"rfid-viruses-and-other-unintended-consequences","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=405","title":{"rendered":"RFID VIRUSES &#8211; AND OTHER UNINTENDED CONSEQUENCES"},"content":{"rendered":"<p><img src=\"\/wp-content\/images\/2006\/03\/rfid-virus.jpg\" alt=\"\" align=\"right\"\/>\n<\/p>\n<p>A friend sent me recently to a web site that I think has many lessons to teach.\n<\/p>\n<p>These lessons are layered like the skin of an onion, starting with a threat analysis of RFID.  The authors (Melanie R. Rieback, Bruno Crispo and Andrew S. Tanenbaum) do a great job not only of thinking through and prototyping threats, but of explaining themselves in a paper called &#8220;<a href=\"http:\/\/www.rfidvirus.org\/papers\/percom.06.pdf\">Is Your Cat Infected Wiith An RFID Virus?<\/a>&#8221;  Reading it you&#39;ll see this is not a rhetorical question.<\/p>\n<p>The site has many other treats as well.  For example:<\/p>\n<blockquote>\n<p>To make clear what kinds of problems might arise from RFID hacking by amateurs or criminals, let us consider three possible and all-too-realistic scenarios. <\/p>\n<li>A prankster goes to a supermarket that scans the purchases in its customers&#8217; shopping carts using the RFID chips affixed to the products instead of their bar codes. Many supermarkets have plans in this direction because RFID scans are faster (and in some cases can be done by the customers, eliminating the expense of having cashiers). The prankster selects, scans, and pays for a nice jar of chunk-style peanut butter that has an RFID tag attached to it. Upon getting it home, he removes or destroys the RFID tag. Then he takes a blank RFID tag he has purchased and writes a exploit on it using his home computer and commercially available equipment for writing RFID tags. He then attaches the infected tag to the jar of peanut butter, brings it back to the supermarket, heads directly for the checkout counter, and pays for it again. Unfortunately, this time when the jar is scanned, the virus on its tag infects the supermarket&#39;s product database, potentially wreaking all kinds of havoc such as changing prices.<\/li>\n<li>Emboldened by his success at the supermarket, the prankster decides to unwittingly enlist his cat in the fun. The cat has a subdermal pet ID tag, which the attacker rewrites with a virus using commercially available equipment. He then goes to a veterinarian (or the ASPCA), claims it is stray cat and asks for a cat scan. Bingo! The database is infected. Since the vet (or ASPCA) uses this database when creating tags for newly-tagged animals, these new tags can also be infected. When they are later scanned for whatever reason, that database is infected, and so on. Unlike a biological virus, which jumps from animal to animal, an RFID virus spread this way jumps from animal to database to animal. The same transmission mechanism that applies to pets also applies to RFID-tagged livestock.<\/li>\n<li>Now we get to the scary part. Some airports are planning to expedite baggage handling by attaching RFID-augmented labels to the suitcases as they are checked in. This makes the labels easier to read at greater distances than the current bar-coded baggage labels. Now consider a malicious traveler who attaches a tiny RFID tag, pre-initialized with a virus, to a random person&#39;s suitcase before he checks it in. When the baggage-handling system&#39;s RFID reader scans the suitcase at a Y-junction in the conveyor-belt system to determine where to route it, the tag responds with the RFID virus, which could infect the airport&#39;s baggage database. Then, all RFID tags produced as new passengers check in later in the day may also be infected. If any of these infected bags transit a hub, they will be rescanned there, thus infecting a different airport. Within a day, hundreds of airport databases all over the world could be infected. Merely infecting other tags is the most benign case. An RFID virus could also carry a payload that did other damage to the database, for example, helping drug smugglers or terrorists hide their baggage from airline and government officials, or intentionally sending baggage destined for Alaska to Argentina to create chaos (e.g., as revenge for a recently fired airline employee).<\/li>\n<\/blockquote>\n<p>The links below give more technical detail about possible attacks and how to prevent them. The authors suggest that you read them in order.<\/p>\n<ul>\n<li><a href=\"http:\/\/www.rfidvirus.org\/middleware.html\">RFID Middleware<\/a><\/li>\n<li><a href=\"http:\/\/www.rfidvirus.org\/malware.html\">Classes of RFID Malware<\/a><\/li>\n<li><a href=\"http:\/\/www.rfidvirus.org\/techarch.html\">The Architecture of RFID Systems<\/a><\/li>\n<li><a href=\"http:\/\/www.rfidvirus.org\/vulnerabilities.html\">Vulnerabilities that Can Be Exploited<\/a><\/li>\n<li><a href=\"http:\/\/www.rfidvirus.org\/virus.html\">How to Write an RFID Virus<\/a><\/li>\n<li><a href=\"http:\/\/www.rfidvirus.org\/worm.html\">How to Write an RFID Worm<\/a><\/li>\n<li><a href=\"http:\/\/www.rfidvirus.org\/defend.html\">How to Defend against RFID Malware<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Members of the Faculty of Sciences at the <a href=\"http:\/\/www.english.vu.nl\/home\/index.cfm\">Vrije Universiteit Amsterdam<\/a> are animating a web site dedicated to RFID Viruses and Worms.  We need to reeducate ourselves so nothing is ever done outside a rigorous privacy and security threat analysis.  This site serves as a good example of how to do this concretely.<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/405"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=405"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/405\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}