Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

RFID & Viral Vulnerability 136

Arleo writes "Student Melanie Rieback and others, part of a Tannenbaum research group in Amsterdam, have proven that RFID-tags are vulnerable for infection with viruses. In a research paper titled "Is Your Cat Infected with a Computer Virus?" is shown how an altered RFID tag can be used to send a SQL injection attack or a buffer overflow. They describe on the rfidvirus.org website possible exploits of this types of viruses: from altering the backoffice of a supermarket to spreading RFID viruses by infected bags on airports."
This discussion has been archived. No new comments can be posted.

RFID & Viral Vulnerability

Comments Filter:
  • by TripMaster Monkey ( 862126 ) * on Wednesday March 15, 2006 @10:06AM (#14923471)

    Fascinating stuff, but it seems that the game plan for protecting against RFID malware is basically the same as protecting against more traditional malware...namely, enforcing proper bounds checking, enforcing proper database permissions heirarchies, disabling back-end scripting languages, isolating the vulnerable RFID middleware server in a proper DMZ environment, etc.

    In other words, RFID malware has just as bright a future as the more traditional flavor, since most developers and administrators can't be bothered to take these elementary precautions.
  • by danpsmith ( 922127 ) on Wednesday March 15, 2006 @10:11AM (#14923498)
    I don't understand why we _have_ to use RFID at all. I understand it may make some things easier, but aren't we efficient enough? In these days where security is becoming more and more of an issue, why even creating another security issue when the old way still works. Is tracking something via a barcode scanning system really so inefficient that we need RFID? I don't understand, we seem to be pretty efficient in most industries already, why do we need to squeeze another cent an hour out by using some new and relatively unproven technology when the old way works just fine?
  • by uniqueUser ( 879166 ) on Wednesday March 15, 2006 @10:13AM (#14923511)
    I understand that a virus could preform an SQL injection or a buffer over run, but these activities are not what defines a virus.

    In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents...-Wikipedia [wikipedia.org]
  • Mighty If-fy (Score:5, Insightful)

    by Billosaur ( 927319 ) * <<wgrother> <at> <optonline.net>> on Wednesday March 15, 2006 @10:14AM (#14923518) Journal

    From rfidvirus.org: Here is where the trouble comes in. Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify back-end software, and certainly not in a malicious way. Unfortunately, they are wrong. In our research, we have discovered that if certain vulnerabilities exist in the RFID software, an RFID tag can be (intentionall) infected with a virus and this virus can infect the backend database used by the RFID software. From there it can be easily spread to other RFID tags. No one thought this possible until now. Later in this website we provide all the details on how to do this and how to defend against it in order to warn the designers of RFID systems not to deploy vulnerable systems.

    So to sum up, if some programmer doesn't do his/her job, the RFID tag they plan on implanting in our passports could be used as delivery devices to compromise computer systems around the globe.

    I'm going to rate this a pretty big if, though, as we know from all the patching going on, the probability is very high. RFID software is going to have to be thoroughly tested and watched like a hawk. Undoubtedly there's going to come a point where if one or two of these viruses get out and something newsworthy happens (airport computers crash, Citigroup gets credit card data stolen, etc.), the whole idea of RFID tags everywhere is going to get a serious black eye.

  • by tgv ( 254536 ) on Wednesday March 15, 2006 @10:19AM (#14923553) Journal
    Not only this, but a single check on the length of the tag would be sufficient against this attack. So in well-designed software there would only be one place where to check for length. It's not like certain well-known operating systems, that have unguarded buffers in dozens of places. That seems to diminish the risk quite a lot. Not to mention that any organization that takes its security serious, will probably set up a warning system for malicious RFID tags, which will expose attackers quite quickly, since they're likely to be physically nearby.
  • user input (Score:5, Insightful)

    by mtenhagen ( 450608 ) on Wednesday March 15, 2006 @10:19AM (#14923555) Homepage
    An RFID tag is the same as any user input and can not be trusted. When your applications are programmed with this in mind from the start this shouldnt be a problem.

    But ofcourse there are nowadays lots of websites which are vurnerable for sql injection and similiar hacks. Even google had a cross site scriptiog exploit.
  • by ookabooka ( 731013 ) on Wednesday March 15, 2006 @10:25AM (#14923592)
    Why did we switch to barcodes when you could just bring it up to the clerk and they would punch in the price? Didn't the old way work? It is definately possible to manipulate barcodes to do some nasty things. Put a barcode from an "IPOD headphone" on an "IPOD Mp3 Player". If the clerk doesnt notice, you just got an Ipod for 10 bux. Obviously I wouldn't advocate doing this, but it goes to show that barcodes are anything but secure. If anything they are easier to manipulate, all you need is a photocopier and some tape. Sounds to me you are just hesitant to change, which is understandable, but IMHO RFID's would give us all a lot of nifty possibilities, which would outweigh the risks. The only problem I see is that it would be harder to manipulate an RFID system, meaning that people would trust it more, meaning that those who do have the knowledge to manipulate it are more likely to get away with it and with larger pay-offs to :-/
  • Pure FUD (Score:4, Insightful)

    by Anonymous Coward on Wednesday March 15, 2006 @10:26AM (#14923597)
    Only if the dimwits writing the RFID reading software are stupid enough to treat all rfid readings as 100% trustable OR does something stupid like allow scripting.

    I can see a buffer overflow if your rfid is capable of generating a string massively larger than a normal rfid.

    Outside of a SQL injection to get past a really poorly designed RFID reading application or plain stupidity in the RFID reading software part I can not see any way for a RFID to get the host reading PC to execute the code inside it.
  • overhype (Score:5, Insightful)

    by tomstdenis ( 446163 ) <tomstdenis@gma[ ]com ['il.' in gap]> on Wednesday March 15, 2006 @10:28AM (#14923609) Homepage
    It has nothing to do with the "evilness of RFID" and with the stupidity of the backend. An RFID tag is just a string of text. It's up to the backend application to sort it out.

    This really is no different than replacing the barcodes on packages.

    Tom
  • by TripMaster Monkey ( 862126 ) * on Wednesday March 15, 2006 @10:30AM (#14923619)

    I think what he's asking is: does the badge record the leaving time as well as the arrival time? This is a problem where I work as well...the badge records when you come in, but doesn't record when you leave, so it doesn't matter if you stay late to finish a project...all the management cares about is when you got there in the morning.

    I don't work late anymore.
  • by Gr8Apes ( 679165 ) on Wednesday March 15, 2006 @10:34AM (#14923638)
    Well there are a couple of advantages that I know of to RFID

    1. Inventory, beeing able to know what is in your store and where it is in a retal setting.


    Actually, according to a recent study, RFIDs are only about 90% accurate at best, for large palettes whizzing by on conveyor belts in a warehouse setting.

    2. Convinence, things like being able to park a cart next to a teller and have all the items charged instantly.

    See #1. I don't know any retailer that would abide by less than 99.999% accuracy. RFID does not meet this requirement at all.

    3. RFID is already used sucessfuly for tracking pets and could be used to store medical data in people with alergies or other specal medical requirements, along with other personal data if the individual choses.

    Let me say I'm scared of some of the potental abuses to, but there are upsides to this.

    Now you're getting to the real meat of why some want RFID to take off. It's much easier to convince someone to accept an injection of a little chip than to be tattooed with a bar code, Henry Rollins not withstanding.

    While it may be beneficial, the very reason it's beneficial is also why it's bad in an Orwellian sense. There is no way for this to be beneficial without the bad. You can't cover up an RFID, or make it inoperative, without impairing its usefulness when needed.
  • by peter303 ( 12292 ) on Wednesday March 15, 2006 @10:46AM (#14923736)
    By itself RFID could be insecure. But you could retain its simplicity and its advantages (extends reading to a couple meters; longer number ID) with a second layer of security.
    For example at one urban college library they put the cardholders' face immediately on the screen. The cardholder could have a fake ID or borrowed a friends, but its much harder to fake a face image. And a image is much easier for the guard to process than some descriptive text. Likewise the RFID code reader could flash an image of the product to the cashier or warehouse clerk as secondary identification.
  • by smooth wombat ( 796938 ) on Wednesday March 15, 2006 @10:51AM (#14923791) Journal
    This may be true but I still pay by check though I'm considering moving to cash, just like I do for gas. Cash only.

    Yeah, it drives the credit agencies nuts because they can't track my credit history because I almost never have a credit bill (excluding my monthly ISP charge). The best they can do is see that I pay all my bills (electric, cable, etc) on time.

    Merchants are certainly stymied because they can't gather enough information on me so they can't send me their snail mail spam.

    No, I'm not paranoid. I just hate debt. Debt is evil. It sucks the life out of ones finances and inhibits the accumulation of wealth.

    Granted, the current administration doesn't understand this but that's a whole other issue.
  • by Opportunist ( 166417 ) on Wednesday March 15, 2006 @10:56AM (#14923852)
    In 2 years you'll get a discount for paying with your card (or pay more for cash, even though they'll still call it a discount).

    In 5 years you won't get anything at a huge supermarket chain anymore without card. Won't work? People will refuse to shop there? Think of some of the huge outlets that only let you IN when you got a card and go figure.
  • by Vo0k ( 760020 ) on Wednesday March 15, 2006 @10:57AM (#14923870) Journal
    Except these dimwits DO treat RFIDs as trustable.
    Not 'evil', just dumb. RFID reader is an insecure input device like any other, and you don't even need physical access to use it. But it seems nobody thought of preparing a barcode that could crash the cash register, recording a magnetic card that would infect the security system, etc. Some devices are thought to be too simple to mean danger - wrongly. I remember some old Atari games that would crash or misbehave if you'd open the joystick and pressed "left" and "right" simultaneously. I burnt electronics of a RC toy car by telling it to go forward and back at the same time. Got a motorbike to run backward by starting the engine by pushing it backwards. Managed to crash my cell phone by buffer overflow at battery load level sensor (it WAS a software failure!) Got a CD tray to stop halfway by simultaneously pressing the eject key and sending eject commands from the computer.

    A toggle switch can be ballanced in the middle position. A pushbutton can be softly pressed make a spark-gap. Unconnected lines can be shorted. Even a single-bit input device cannot be trusted.
  • by gunnk ( 463227 ) <{gunnk} {at} {mail.fpg.unc.edu}> on Wednesday March 15, 2006 @11:20AM (#14924109) Homepage
    Would they have to be nearby?

    I see a real threat for anonymous attacks:

    Attacker buys RFID-tracked product at store.
    Attacker alters RFID-tracked product to allow for attack.
    Attacker returns the product to the store shelf and waits...
    Joe Sixpack checks out with infected product.
    Clerk scans product and infects store database.
    All prices for all products now set to $0.
  • by gunnk ( 463227 ) <{gunnk} {at} {mail.fpg.unc.edu}> on Wednesday March 15, 2006 @11:27AM (#14924199) Homepage
    2. Convinence, things like being able to park a cart next to a teller and have all the items charged instantly.

    See #1. I don't know any retailer that would abide by less than 99.999% accuracy. RFID does not meet this requirement at all.


    If you think this is true, you need to check your receipts and count your change more frequently.

    I've never seen a shop that manages 99% accuracy... the clerk fails to scan an item (doesn't notice it didn't beep), the item is in the database with the wrong price, the item scans twice, the item is missing entirely (so the clerk asks you to give them the price)...

    99.999%???

  • by maxwell demon ( 590494 ) on Wednesday March 15, 2006 @12:08PM (#14924630) Journal
    Scenario: Someone working at the IT department of a shop (thus having inside knowledge of the system) gets fired and wants to harm the shop. The shop will make damn sure that he will not have access to the system afterwards (and let's assume that network access is well protected, too). However, he may well be able to smuggle a malicious RFID tag into the shop. There it lies, unnoticed, until a few days later some unsuspecting customer buys the item thus tagged. As soon as the tag is read by the scanner, the attack happened.
  • by rk ( 6314 ) * on Wednesday March 15, 2006 @12:35PM (#14924902) Journal

    "A lot of good comments have already been made here, but I'm surprised nobody has commented yet on something that seems obvious: if you're going to hack into a system, you have to know a little bit about the system first."

    You're 100% right, but there will emerge from 1 to 3 dominant vendors of backend RFID systems, and they will be deployed in many places, many people will have knowledge of these systems, and help to learn about their underlying architecture will likely be found right on the vendor's website, or only a couple Google searches away. Like every other system out there, there will be a few weird custom jobs, but most of it will be off-the-shelf software that thousands of organizations use.

    Today's theoretical often winds up being tomorrow's practical.

  • by BeBoxer ( 14448 ) on Wednesday March 15, 2006 @01:31PM (#14925459)
    Not only this, but a single check on the length of the tag would be sufficient against this attack.

    Not true. The article specifically mentions potential SQL injection attacks, which are not caught by a simple length check. Also, you are assuming that the tag contains nothing more complex than a single ID number. As the complexity of the data in the tag goes up, so does the complexity of the parsing code for that data. Take for example including a picture of the owner in the RFID tag inside of a passport. Now the outside data is being fed to a some type of image decompression software with all sorts of opportunities for vulnerable bugs. Not only is image data likely to be a component of lots of RFID data, image decompression routines have historically been fertile ground to exploitable code bugs.

    None of which is to say that the problem isn't manageable, but just that it's a lot more involved than a single length check. In fact, it's that kind of thinking which leads to vulnerable bugs. "Hey, this 1KB of random data is the right length, it must be OK. No need to worry about bugs anywhere else in the system." Riiiight.

For God's sake, stop researching for a while and begin to think!

Working...