Abstract :
A radio frequency identification (RFID) system has two parts: a (usually portable) reader and a tiny transponder (radio tag, RFID chip), which is embedded in or attached to the tracked object (such as a piece of baggage on an airport conveyor belt or a pet). Researchers from Vrije Universiteit in Amsterdam demonstrate in (M. Rieback et al, 2006) how these tiny RFID tags can be used to spread malicious computer code. Since the tags have a very limited memory (typically less than 1,024 b), it had been generally assumed that they were unsuitable vectors for introducing viruses into computers connected to RFID readers (W. Knight, 2006).
Keywords :
computer viruses; radiofrequency identification; transponders; malicious computer code; phishing; radio frequency identification system readers; radio frequency identification system tags; radio tag; transponder; viruses; Base stations; Computer viruses; Data security; Dielectric losses; Layout; Positron emission tomography; Predistortion; RFID tags; Radiofrequency identification; Resonator filters;