Academia.eduAcademia.edu

Is your cat infected with a computer virus?

2006

Abstract

RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as properly formatted but fake RFID data; however no one expects an RFID tag to send a SQL injection attack or a buffer overflow. This paper is meant to serve as a warning that data from RFID tags can be used to exploit back-end software systems. RFID middleware writers must therefore build appropriate checks (bounds checking, special character filtering, etc..), to prevent RFID middleware from suffering all of the well-known vulnerabilities experienced by the Internet. Furthermore, as a proof of concept, this paper presents the first self-replicating RFID virus. This virus uses RFID tags as a vector to compromise backend RFID middleware systems, via a SQL injection attack.

Key takeaways

  • However, no one currently expects an RFID tag to send a SQL injection attack or a buffer over-
  • RFID tag data storage limitations are not a problem for these attacks because it is possible to do quite a lot of harm in a very small amount of SQL [5].
  • This particular RFID virus uses SQL injection to attack the backend RFID middleware systems.
  • For example, the SQL injection payload could create and use stored procedures to infect RFID tags, while leaving the database tables unmodified.
  • One way for our RFID virus to do this is to use a SQL quine.