Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
RFIDs and Secret Handshakes: Defending Against Ghost-and-Leech Attacks and
 

Summary: RFIDs and Secret Handshakes:
Defending Against Ghost-and-Leech Attacks and
Unauthorized Reads with Context-Aware Communications
Alexei Czeskis
University of Washington
aczeskis@cs.washington.edu
Karl Koscher
University of Washington
supersat@cs.washington.edu
Joshua R. Smith
Intel Research Seattle
joshua.r.smith@intel.com
Tadayoshi Kohno
University of Washington
yoshi@cs.washington.edu
ABSTRACT
We tackle the problem of defending against ghost-and-leech
(a.k.a. proxying, relay, or man-in-the-middle) attacks against
RFID tags and other contactless cards. The approach we
take -- which we dub secret handshakes -- is to incorpo-

  

Source: Anderson, Richard - Department of Computer Science and Engineering, University of Washington at Seattle
Kohno, Tadayoshi - Department of Computer Science and Engineering, University of Washington at Seattle
Xu, Wenyuan - Department of Computer Science and Engineering, University of South Carolina

 

Collections: Computer Technologies and Information Sciences; Engineering