Skip to Main Content
How to Cheat at Deploying and Securing RFID
book

How to Cheat at Deploying and Securing RFID

by Frank Thornton, Paul Sanghera
April 2011
Intermediate to advanced content levelIntermediate to advanced
362 pages
8h 1m
English
Syngress
Content preview from How to Cheat at Deploying and Securing RFID

Chapter 12. RFID Attacks: Tag Encoding Attacks

Introduction

As with any system, Radio Frequency Identification (RFID) is vulnerable to attack. People that work in information security know that any system, including a RFID, can be compromised given enough time and effort. The Exxon-Mobil SpeedPass is a great example of a system that, given enough time and interest from researchers, became a target for research on many fronts.

Case Study: John Hopkins vs. SpeedPass

In 1997, Mobil Oil launched a new payment system for their gas stations and convenience stores called “SpeedPass,” which ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Getting Started with RFID

Getting Started with RFID

Tom Igoe
RFID For Dummies®

RFID For Dummies®

Patrick J. Sweeney II
Advanced Chipless RFID

Advanced Chipless RFID

Nemai Chandra Karmakar, Mohammad Zomorrodi, Chamath Divarathne

Publisher Resources

ISBN: 9781597492300