{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:12:57Z","timestamp":1774631577810,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319490991","type":"print"},{"value":"9783319491004","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49100-4_4","type":"book-chapter","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T10:41:42Z","timestamp":1477996902000},"page":"92-111","source":"Crossref","is-referenced-by-count":10,"title":["NFC Payment Spy: A Privacy Attack on Contactless Payments"],"prefix":"10.1007","author":[{"given":"Maryam","family":"Mehrnezhad","sequence":"first","affiliation":[]},{"given":"Mohammed Aamir","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,2]]},"reference":[{"key":"4_CR1","unstructured":"Host-based card emulation. http:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce.html."},{"key":"4_CR2","unstructured":"International Organization for Standardization, BS ISO, IEC 14443\u20131: 2008+A1: 2012 Identification cards. Contactless integrated circuit cards. Proximity cards. Physical characteristics (2012). http:\/\/www.bsol.bsigroup.com"},{"key":"4_CR3","unstructured":"International Organization for Standardization, BS ISO, IEC 14443\u20132: 2010+A2: 2012 Identification cards. Contactless integrated circuit cards. Proximity cards. Radio frequency power and signal interface (2012). http:\/\/www.bsol.bsigroup.com"},{"key":"4_CR4","unstructured":"International Organization for Standardization, BS ISO, IEC 14443\u20133: 2011+A6: 2014 Identification cards. Contactless integrated circuit cards. Proximity cards. Initialization and anticollision (2014). http:\/\/www.bsol.bsigroup.com"},{"key":"4_CR5","unstructured":"International Organization for Standardization, BS ISO, IEC 14443\u20134: 2008+A4: 2014 Identification cards. Contactless integrated circuit cards. Proximity cards. Transmission protocol (2014). http:\/\/www.bsol.bsigroup.com"},{"key":"4_CR6","unstructured":"EMV Contactless Specifications for Payment Systems, Book A: Architecture and General Requirements (2015). http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"4_CR7","unstructured":"EMV Contactless Specifications for Payment Systems, Book B: Entry Point (2015). http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"4_CR8","unstructured":"EMV Contactless Specifications for Payment Systems, Book C2: Kernel 2 Specification (2015). http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"4_CR9","unstructured":"EMV Contactless Specifications for Payment Systems, Book C3: Kernel 3 Specification (2015). http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"4_CR10","unstructured":"EMV Contactless Specifications for Payment Systems, Book D: Contactless Communication Protocol (2015). http:\/\/www.emvco.com\/specifications.aspx?id=21"},{"key":"4_CR11","unstructured":"EMV Integrated Circuit Card Specifications for Payment Systems, Book 3 (2011). http:\/\/www.emvco.com\/specifications.aspx?id=223"},{"key":"4_CR12","unstructured":"International Organization for Standardization, BS ISO, IEC 7816\u20134: 2013, Identification cards. Integrated circuit cards. Organization, security and commands for interchange (2013). http:\/\/www.bsol.bsigroup.com"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Sapp, B., Blaze, M., Smith, J.M.: Practicality of accelerometer side channels on smartphones. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 41\u201350. ACM (2012)","DOI":"10.1145\/2420950.2420957"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Balebako, R., Jung, J., Lu, W., Cranor, L.F., Nguyen, C.: \u201clittle brothers watching you\u201d: Raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, pp. 12:1\u201312:11. ACM, New York (2013)","DOI":"10.1145\/2501604.2501616"},{"key":"4_CR15","unstructured":"Cai, L., Chen, H.: Touchlogger: inferring keystrokes on touch screen from smartphone motion. In: HotSec (2011)"},{"key":"4_CR16","unstructured":"Curphey, M.: Card clash, what is it, and how to avoid ir (2014). http:\/\/uk.creditcards.com\/credit-card-news\/what-is-card-clash-and-how-to-avoid-it-1372.php"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-39884-1_26","volume-title":"Financial Cryptography and Data Security","author":"M Emms","year":"2013","unstructured":"Emms, M., Arief, B., Little, N., Moorsel, A.: Risks of offline verify PIN on contactless cards. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 313\u2013321. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-39884-1_26"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-642-33167-1_22","volume-title":"Computer Security \u2013 ESORICS 2012","author":"T Halevi","year":"2012","unstructured":"Halevi, T., Ma, D., Saxena, N., Xiang, T.: Secure proximity detection for NFC devices based on ambient sensor data. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 379\u2013396. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33167-1_22"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Li, H., Ma, D., Saxena, N., Shrestha, B., Zhu, Y.: Tap-wave-rub: lightweight malware prevention for smartphones using intuitive human gestures. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2013, pp. 25\u201330. ACM, New York (2013)","DOI":"10.1145\/2462096.2462101"},{"key":"4_CR20","unstructured":"Marshall, G.: Travel using contactless cards: an update from tfl (2014). http:\/\/londonist.com\/2014\/07\/travel-using-contactless-cards-an-update-from-tfl"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-27152-1_2","volume-title":"Security Standardisation Research","author":"M Mehrnezhad","year":"2015","unstructured":"Mehrnezhad, M., Hao, F., Shahandashti, S.F.: Tap-tap and pay (TTP): preventing the mafia attack in NFC payment. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 21\u201339. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-27152-1_2"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Mehrnezhad, M., Toreini, E., Shahandashti, S.F., Hao, F.: Touchsignatures: identification of user touch actions based on mobile sensors via javascript. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2015, pp. 673\u2013673. ACM, New York (2015)","DOI":"10.1145\/2714576.2714650"},{"key":"4_CR23","first-page":"23","volume":"26","author":"M Mehrnezhad","year":"2016","unstructured":"Mehrnezhad, M., Toreini, E., Shahandashti, S.F., Hao, F.: Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript. J. Inf. Secur. Appl. 26, 23\u201338 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323\u2013336. ACM (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"4_CR25","unstructured":"Morley, K.: Contactless cards: how to avoid paying twice (2014). http:\/\/www.telegraph.co.uk\/finance\/personalfinance\/money-saving-tips\/11215583\/Contactless-cards-how-to-avoid-paying-twice.html"},{"key":"4_CR26","unstructured":"ISO 14443, ISO 18092, Type-A, Type-B, Type-F, Felica, Calypso NFCIP, NFC-HELP! (2009). http:\/\/www.nfc.cc\/2009\/01\/03\/iso-14443-iso-18092-type-a-type-b-type-f-felica-calypso-nfcip-nfc-help\/"},{"key":"4_CR27","unstructured":"AN10927, MIFARE and handling of UIDs. By NXP, Company Public (2013)"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Owusu, E., Han, J., Das, S., Perrig, A., Zhang, J.: Accessory: password inference using accelerometers on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, p. 9. ACM (2012)","DOI":"10.1145\/2162081.2162095"},{"key":"4_CR29","unstructured":"Saul, H.: Oyster card users pay up to \u00a391 more each week than peopleusing new contactless payment (2014). http:\/\/www.independent.co.uk\/news\/uk\/home-news\/oyster-card-users-pay-up-to-91-more-each-week-than-people-using-new-contactless-payment-9843642.htmll"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-662-45472-5_23","volume-title":"Financial Cryptography and Data Security","author":"B Shrestha","year":"2014","unstructured":"Shrestha, B., Saxena, N., Truong, H.T.T., Asokan, N.: Drone to the rescue: relay-resilient authentication using ambient multi-sensing. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 349\u2013364. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45472-5_23"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Simon, L., Anderson, R.: Pin skimmer: inferring pins through the camera and microphone. In: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2013, pp. 67\u201378. ACM, New York (2013)","DOI":"10.1145\/2516760.2516770"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Spreitzer, R.: Pin skimming: exploiting the ambient-light sensor in mobile devices. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2014, pp. 51\u201362. ACM, New York (2014)","DOI":"10.1145\/2666620.2666622"},{"key":"4_CR33","unstructured":"Why contactless cards can leave you with a losing deal (2014). http:\/\/www.theguardian.com\/money\/2013\/may\/25\/contactless-cards"},{"key":"4_CR34","unstructured":"Watch out for card clash. https:\/\/tfl.gov.uk\/fares-and-payments\/contactless\/card-clash"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-24837-0_6","volume-title":"Radio Frequency Identification","author":"J Vila","year":"2015","unstructured":"Vila, J., Rodr\u00edguez, R.J.: Practical experiences on NFC relay attacks with android. In: Mangard, S., Schaumont, P. (eds.) RFIDSec 2015. LNCS, vol. 9440, pp. 87\u2013103. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-24837-0_6"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S.: Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 113\u2013124. ACM (2012)","DOI":"10.1145\/2185448.2185465"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49100-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:31:37Z","timestamp":1498343497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49100-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319490991","9783319491004"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49100-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}