{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:55:48Z","timestamp":1756896948653,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319398136"},{"type":"electronic","value":"9783319398143"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39814-3_8","type":"book-chapter","created":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T04:24:34Z","timestamp":1464755074000},"page":"71-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An NFC Relay Attack with Off-the-shelf Hardware and Software"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Bocek","sequence":"first","affiliation":[]},{"given":"Christian","family":"Killer","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Tsiaras","sequence":"additional","affiliation":[]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"8_CR1","unstructured":"CyanogenMod. \n                      http:\/\/www.cyanogenmod.org\n                      \n                    . Accessed Jan 2016"},{"key":"8_CR2","unstructured":"EMV Contactless Specifications for Payment - Systems Book C-3 - Kernel 3 (Visa)"},{"key":"8_CR3","unstructured":"EMV Key Management - Explained. \n                      https:\/\/www.cryptomathic.com\/hubfs\/docs\/cryptomathic_white_paper-emv_key_management.pdf\n                      \n                    . Accessed Jan 2016"},{"key":"8_CR4","unstructured":"EMVCo. \n                      http:\/\/www.emvco.com\n                      \n                    . Accessed Jan 2016"},{"key":"8_CR5","unstructured":"ISO, IEC 14443\u20132: 2010 - Identification cards - Contactless integrated circuit cards - Proximity cards, Part 2: Radio frequency power and signal interface (2010)"},{"key":"8_CR6","unstructured":"ISO, IEC 14443\u20133: 2011 - Identification cards - Contactless integrated circuit cards - Proximity cards, Part 3: Initialization and anticollision (2011)"},{"key":"8_CR7","unstructured":"ISO, IEC 14443\u20134: 2008 - Identification cards - Contactless integrated circuit cards - Proximity cards, Part 4: Transmission protocol (2008)"},{"key":"8_CR8","unstructured":"ISO, IEC 7816\u20133: 2006 - Identification cards - Integrated circuit cards, Part 3: Cards with contacts - Electrical interface and transmission protocols (2006)"},{"key":"8_CR9","unstructured":"ISO, IEC 7816\u20134: 2013 - Identification cards - Integrated circuit cards, Part 4: Organization, security and commands for interchange (2013)"},{"key":"8_CR10","unstructured":"NFCProxy. \n                      http:\/\/sourceforge.net\/projects\/nfcproxy\/\n                      \n                    . Accessed Jan 2016"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S.P., Anderson, R.J.: Chip and skim: cloning EMV cards with the pre-play attack. In: IEEE Symposium on Security and Privacy (SP 2014), San Jose, CA, USA, May 2014","DOI":"10.1109\/SP.2014.11"},{"key":"8_CR12","unstructured":"van den Breekel, J.: NFC Hacking: The Easy Way, DEF CON 2012, Las Vegas, Nevada, USA, July 2012"},{"key":"8_CR13","unstructured":"van den Breekel, J.: Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices, BlackHat Asia, Singapore, March 2015"},{"key":"8_CR14","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/978-3-662-47854-7_11","volume-title":"Financial Cryptography and Data Security","author":"Tom Chothia","year":"2015","unstructured":"Chothia, T., Garcia, F.D., de Ruiter, J., van den Breekel, J., Thompson, M.: Relay cost bounding for contactless EMV payments. In: 19th International Conference on Financial Cryptography and Data Security, Puerto Rico, January 2015"},{"key":"8_CR15","unstructured":"Chu, X.: Relay attacks of NFC smart cards. Master Thesis, NTNU Trondheim, Norwegian University of Science and Technology, Department of Telematics, June 2014"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-16822-2_4","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"L Francis","year":"2010","unstructured":"Francis, L., Hancke, G., Mayes, K., Markantonakis, K.: Practical NFC peer-to-peer relay attack using mobile phones. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 35\u201349. Springer, Heidelberg (2010)"},{"issue":"7","key":"8_CR17","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.cose.2009.06.001","volume":"28","author":"GP Hancke","year":"2009","unstructured":"Hancke, G.P., Mayes, K.E., Markantonakis, K.: Confidence in smart token proximity: relay attacks revisited. Comput. Secur. 28(7), 615\u2013627 (2009)","journal-title":"Comput. Secur."},{"key":"8_CR18","unstructured":"Hancke, G.: A Practical Relay Attack on ISO 14443 Proximity Cards. Technical report, University of Cambridge Computer Laboratory, February 2005"},{"key":"8_CR19","unstructured":"Hancke, G., Kuhn, M.: An RFID distance bounding protocol. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, September 2005"},{"key":"8_CR20","unstructured":"Kfir, Z., Wool, A.: Picking virtual pockets using relay attacks on contactless smartcard. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm 2005), Athens, Greece, September 2005"},{"key":"8_CR21","unstructured":"Killer, C.: NFCProxy Relay Attack in the Wild. \n                      https:\/\/www.youtube.com\/watch?v=fRtn4ZfkLkM\n                      \n                    . Accessed Jan 2016"},{"key":"8_CR22","unstructured":"Killer, C.: Security Challenges in Contactless Payments Solutions. Assignment Communication Systems Group, Department of Informatics, University of Zurich, June 2015"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and PIN is broken. In: IEEE Symposium on Security and Privacy (SP 2010), Oakland, CA, USA, May 2010","DOI":"10.1109\/SP.2010.33"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Anderson, R.: Verified by visa and mastercard securecode: or, how not to design authentication. In: 14th International Conference on Financial Cryptography and Data Security (FC 2010), Tenerife, Spain, January 2010","DOI":"10.1007\/978-3-642-14577-3_27"},{"key":"8_CR25","unstructured":"Ngu, M., Scott, C.: How secure are contactless payment systems? In: RSA Conference, San Francisco, USA, April 2015"},{"key":"8_CR26","unstructured":"Roland, M., Langer, J.: Cloning credit cards: a combined pre-play and downgrade attack on EMV contactless. In: 7th USENIX Conference on Offensive Technologies (WOOT 2013), Washigton, D.C., USA, August 2013"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Vila, J., Rodriguez, R.J.: Practical experiences on NFC relay attacks with android - virtual pickpocketing revisited. In: 11th Workshop on RFID Security (RFIDSEC 2015), New York City, USA, June 2015","DOI":"10.1007\/978-3-319-24837-0_6"},{"key":"8_CR28","unstructured":"Wei\u00df, M.: Performing Relay Attacks on ISO 14443 Contactless Smart Cards using NFC Mobile Equipment. Master Thesis, Technische Universit\u00e4t M\u00fcnchen, May 2010"}],"container-title":["Lecture Notes in Computer Science","Management and Security in the Age of Hyperconnectivity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39814-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:04:50Z","timestamp":1591401890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39814-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319398136","9783319398143"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39814-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}