Shared Flashcard Set

Details

Attacks & Countermeasures
N/A
39
Computer Science
Undergraduate 4
04/28/2012

Additional Computer Science Flashcards

 


 

Cards

Term
What are the five attacks addressing confidentiality?
Definition
Eavesdropping
Tracking / tracing
Skimming
Direct confidentiality attack
Decoding encryption
Term
What is eavesdropping?
Definition
Unauthorised listening / interception
Term
What three types of eavesdropping are there?
Definition
A detection
A transmission only attack
A complete attack
Term
What is a detection attack? (Eavesdropping)
Definition
Detecting but not being able to trasnslate
Term
What is a transmission only attack? (Eavesdropping)
Definition
Due to the difference in transmission range between a reader and
a tag the eavesdropper is only able to detect and translate the readers signal
Term
What is a complete attack? (Eavesdropping)
Definition
The eavesdropper is able to record and translate both the reader and tag
communication.
Term
What are the distances for eavesdropping between a tag and reader?
Definition
10-30m
Term
What is the distance for eavesdropping between a reader and a tag?
Definition
100m
Term
What is analysed during a tracking / tracing attack?
Definition
Comms patterns
Data
Time
Location
Term
What is skimming?
Definition
Un-authorised access to data on a tag
Term
What is the relationship between distance-cost-availability-knowledge?
Definition
As distance goes up, availability goes down, cost goes up and the amount of knowledge required by the attack goes up.
Term
What is the (theoretical) distance / power relationsip for skimming?
Definition
16*power = 2 distance
Term
Why is the distance limited during skimming?
Definition
Noise levels
Term
What is the practical limit of skimming?
Definition
20*power = 2*distance
Term
What is the practical limit without additional measures for ISO/IEC 14443
Definition
40cm
Term
What is a direct confidentiality attack?
Definition
RFID tag receives interrogation req from attacker. Data is returned by tag.
Term
What two attacks address integrity
Definition
Spoofing
Cloning
Term
What is spoofing?
Definition
Sending duplicated or corrupted data to the reader
Term
What is cloning?
Definition
Duplicating tag data
Term
Where is integrity vulnerable? (2)
Definition
On the tag
During transmission
Term
Explain how a spoofing attack occurrs (4)
Definition
Data and trx duplicated to the reader

UID and memory data from tag is read and stored

Tag is emulated using UID and memory data

Memory data changed as desired
Term
What is in danger of spoofing / cloning?
Definition
Read only and read/write tags without encryption are in danger as the reader is not able to detect spoofing / cloning
Term
What is a tag directed integrity attack?
Definition
An attacker sends a corruption attack to the tag, and then RFID tag relays that data to the user.
Term
What protect integrity
Definition
Cryptographic procedures
Term
what two things can crypto do?
Definition
Auth between tag and reader

Encryption between tag and reader
Term
What feature does E-passports have?
Definition
Passive authentication (stored data authenticity)
Term
Which algorithms can E-passports use?
Definition
RSA, DSA, ECDSA
Term
What are the threats to E-passports?
Definition
Tracking
Hotlisting
Scanning
Passive eavesdropping
Skimming
Leaking biometric data
Term
What is the negative of using crypto?
Definition
Increases power, decreases range
Term
4 Availability attacks
Definition
Shielding / Absorption / Detuning
Jamming
Destruction
Overloading the reader
Term
What is jamming?
Definition
Distrupting function by electro-magnetic signals
Term
What is destruction?
Definition
Smashing the chip
Term
What is shielding/ absorption/ detuning?
Definition
Disrupting function by using mechanical means
Term
What is overloading the reader?
Definition
A dos attack
Term
What is the jamming range capable of at 1 W?
Definition
100m
Term
Name a collision attack
Definition
Using a blocker tag
Term
What's a relay attack?
Definition
Communication between reader and tag is relayed over means supporting fast communication
Term
What three countermeasures are there to RFID tags?
Definition
Additional Confirmation

Using sensor information

Key management
Term
What can a possible RFID malware payload do?
Definition
Disrupt the working of the back-end RFID system, then infect other RFID systems
Supporting users have an ad free experience!