RFID malware fragmentation attacks.
Anthonius SulaimanMadhu K. ShankarapaniSrinivas MukkamalaAndrew H. SungPublished in: CTS (2008)
Keyphrases
- detect malicious
- malicious code
- detecting malicious
- attack scenarios
- static analysis
- countermeasures
- supply chain
- low cost
- rfid technology
- reverse engineering
- rfid tags
- chosen plaintext
- malicious attacks
- rfid systems
- java card
- data collection
- security protocols
- network traffic
- dynamic analysis
- radio frequency identification
- security threats
- radio frequency identification rfid
- anti virus
- horizontal fragmentation
- supply chain management
- web services
- vertical fragmentation
- object oriented databases
- rfid reader
- security mechanisms
- traffic analysis
- control flow
- malware detection
- cyber attacks