{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:22:17Z","timestamp":1769926937583,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607243","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"195-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Beware of Pickpockets: A Practical Attack against Blocking Cards"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5963-4599","authenticated-orcid":false,"given":"Marco","family":"Alecci","sequence":"first","affiliation":[{"name":"SnT - Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3653-7080","authenticated-orcid":false,"given":"Luca","family":"Attanasio","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6138-2995","authenticated-orcid":false,"given":"Alessandro","family":"Brighente","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2315-7823","authenticated-orcid":false,"given":"Eleonora","family":"Losiouk","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9303-5250","authenticated-orcid":false,"given":"Hideki","family":"Ochiai","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Yokohama National University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5660-2447","authenticated-orcid":false,"given":"Federico","family":"Turrin","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Contactless Payment Statistics","year":"2022","unstructured":"2022. Contactless Payment Statistics in 2022. https:\/\/fitsmallbusiness.com\/contactless-payment-statistics\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Ajoo\u2019s Blog. 2017. Intro to RTL-SDR Part I - Principles and Hardware. https:\/\/web.archive.org\/web\/20191120002326http:\/\/ajoo.blog\/intro-to-rtl-sdr-part-i-principles-and-hardware.html"},{"key":"e_1_3_2_1_3_1","first-page":"132","article-title":"Blocking contactless personal security device","volume":"11","author":"Audebert Yves","year":"2006","unstructured":"Yves Audebert and Wu Wen. 2006. Blocking contactless personal security device. US Patent App. 11\/446,132.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2581165"},{"key":"e_1_3_2_1_5_1","volume-title":"Another look at relay and distance-based attacks in contactless payments. Cryptology ePrint Archive","author":"Boureanu Ioana","year":"2018","unstructured":"Ioana Boureanu and Anda Anda. 2018. Another look at relay and distance-based attacks in contactless payments. Cryptology ePrint Archive (2018)."},{"key":"e_1_3_2_1_6_1","unstructured":"Andrei Costin. 2022. MFCUK an open source C implementation of the Courtois Dark Side attack. https:\/\/code.google.com\/p\/mfcuk\/."},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Smart Card Research and Advanced Applications. Springer, 57\u201372","author":"Courbon Franck","year":"2016","unstructured":"Franck Courbon, Sergei Skorobogatov, and Christopher Woods. 2016. Reverse engineering flash EEPROM memories using scanning electron microscopy. In International Conference on Smart Card Research and Advanced Applications. Springer, 57\u201372."},{"key":"e_1_3_2_1_8_1","first-page":"137","article-title":"The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime","volume":"2009","author":"Courtois T.","year":"2009","unstructured":"Nicolas\u00a0T. Courtois. 2009. The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. IACR Cryptol. ePrint Arch. 2009 (2009), 137.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_9_1","volume-title":"Identity Theft and Credit Card Fraud Statistics. Accessed","author":"Daly Lyle","year":"2023","unstructured":"Lyle Daly and Jack Caporal. 2022. Identity Theft and Credit Card Fraud Statistics. Accessed Jul 1, 2023. https:\/\/www.fool.com\/the-ascent\/research\/identity-theft-credit-card-fraud-statistics."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433182"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464455"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4993"},{"key":"e_1_3_2_1_15_1","first-page":"382","article-title":"A practical relay attack on ISO 14443 proximity cards. Technical report","volume":"59","author":"Hancke P","year":"2005","unstructured":"Gerhard\u00a0P Hancke. 2005. A practical relay attack on ISO 14443 proximity cards. Technical report, University of Cambridge Computer Laboratory 59 (2005), 382\u2013385.","journal-title":"University of Cambridge Computer Laboratory"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1971859.1971863"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1088\/0143-0807\/31\/3\/003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.008"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706156"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on RFID Security (RFIDSec). 141\u2013152","author":"Konidala M","year":"2007","unstructured":"Divyan\u00a0M Konidala, Zeen Kim, and Kwangjo Kim. 2007. A simple and cost-effective RFID tag-reader mutual authentication scheme. In International Conference on RFID Security (RFIDSec). 141\u2013152."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_20"},{"key":"e_1_3_2_1_25_1","volume-title":"The Norwegian Information Security Conference (NISK), Vol.\u00a027","author":"Kortvedt Henning","year":"2009","unstructured":"Henning Kortvedt and S Mjolsnes. 2009. Eavesdropping near field communication. In The Norwegian Information Security Conference (NISK), Vol.\u00a027. 5768."},{"key":"e_1_3_2_1_26_1","volume-title":"RFID Eavesdropping Using SDR Platforms. In International Conference on Applications in Electronics Pervading Industry, Environment and Society. Springer, 208\u2013214","author":"Le\u00a0Roy Fr\u00e9d\u00e9ric","year":"2016","unstructured":"Fr\u00e9d\u00e9ric Le\u00a0Roy, Thierry Quiniou, Ali Mansour, Raafat Lababidi, and Denis Le\u00a0Jeune. 2016. RFID Eavesdropping Using SDR Platforms. In International Conference on Applications in Electronics Pervading Industry, Environment and Society. Springer, 208\u2013214."},{"key":"e_1_3_2_1_27_1","volume-title":"Friendly-Jamming: An Anti-Eavesdropping Scheme in Wireless Networks of Things. In IEEE Global Communications Conference (GLOBECOM). 1\u20136.","author":"Li Xuran","year":"2016","unstructured":"Xuran Li, Hong-Ning Dai, and Hao Wang. 2016. Friendly-Jamming: An Anti-Eavesdropping Scheme in Wireless Networks of Things. In IEEE Global Communications Conference (GLOBECOM). 1\u20136."},{"key":"e_1_3_2_1_28_1","unstructured":"livedoor. 2012. RTL-SDR hardware modification for receiving HF signals. http:\/\/blog.livedoor.jp\/bh5ea20tb\/archives\/4263275.html"},{"key":"e_1_3_2_1_29_1","unstructured":"Stefan Mangard Elisabeth Oswald and Thomas Popp. 2008. Power analysis attacks: Revealing the secrets of smart cards. Vol.\u00a031."},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium.","author":"Nohl Karsten","year":"2008","unstructured":"Karsten Nohl, David Evans, Starbug, and Henryk Pl\u00f6tz. 2008. Reverse-Engineering a Cryptographic RFID Tag. In USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","unstructured":"NXP Semiconductors. 2014. MIFARE Ultralight EV1 - Contactless ticket IC Datasheet - Rev. 3.3. https:\/\/www.nxp.com\/docs\/en\/data-sheet\/MF0ULX1.pdf"},{"key":"e_1_3_2_1_32_1","unstructured":"NXP Semiconductors. 2017. MIFARE Classic EV1 4K - Mainstream contactless smart card IC for fast and easy solution development - Rev. 3.2. https:\/\/www.nxp.com\/docs\/en\/data-sheet\/MF1S70YYX_V1.pdf."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3159185"},{"key":"e_1_3_2_1_34_1","unstructured":"RFID4u. 2022. RFID Basics - RFID Regulations. https:\/\/rfid4u.com\/rfid-regulations\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Qihang Shi Domenic Forte and Mark\u00a0M Tehranipoor. 2017. Analyzing circuit layout to probing attack. In Hardware IP Security and Trust. 73\u201398.","DOI":"10.1007\/978-3-319-49025-0_5"},{"key":"e_1_3_2_1_36_1","first-page":"936","article-title":"Shield for radio frequency ID tag or contactless smart card","volume":"7","author":"Shkolnikov Yakov\u00a0Pytor","year":"2011","unstructured":"Yakov\u00a0Pytor Shkolnikov, Yanqing Du, and Brad\u00a0Alexander McGoran. 2011. Shield for radio frequency ID tag or contactless smart card. US Patent 7,936,274.","journal-title":"US Patent"},{"key":"e_1_3_2_1_37_1","volume-title":"Practical Attacks on NFC Enabled Cell Phones. In 2011 Third International Workshop on Near Field Communication. 77\u201382","author":"Verdult Roel","year":"2011","unstructured":"Roel Verdult and Francois Kooman. 2011. Practical Attacks on NFC Enabled Cell Phones. In 2011 Third International Workshop on Near Field Communication. 77\u201382."},{"key":"e_1_3_2_1_38_1","unstructured":"Wikipedia. 2022. MIFARE - Places that use MIFARE products. https:\/\/en.wikipedia.org\/wiki\/MIFARE."},{"key":"e_1_3_2_1_39_1","unstructured":"Zerobrain. 2019. Test! RFID \/ NFC Blocker Karten - Schutz oder Placebo?https:\/\/www.youtube.com\/watch?v=2Gl4xtHcAYY"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594376"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Hong Kong China","acronym":"RAID 2023"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607243","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:35Z","timestamp":1750178255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":37,"alternative-id":["10.1145\/3607199.3607243","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607243","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}