Automating NFC message sending for good and evil

  • Nikki Benecke Brandt
  • Mark Stamp
Original Paper


Near Field Communication (NFC) is an emerging proximity wireless technology used for triggering automatic interactions between mobile devices. In standard NFC usage, one message is sent per device contact, then the devices must be physically separated and brought together again. In this paper, we present a mechanism for automatically sending multiple messages without any need to physically decouple the devices. After an introduction to NFC and related security issues, we discuss the motivation for—and an implementation of—an automation framework for sending repeated NFC messages without any need for human interaction. Then we consider how such an automated mechanism can be used for both a denial of service attack and as a platform for fuzz testing. We present experimental evidence on the efficacy of automated NFC as a vector for achieving these goals. We conclude with suggestions for future work and provide some overall insights.


File Size Android Near Field Communication Service Attack Android Phone 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Amini, P., Protnoy, A.: Sulley Fuzzing Framework.
  2. 2.
  3. 3.
    Android Developers: Near Field Communication.
  4. 4.
    Android Developers: Reading and Writing Logs.
  5. 5.
    Boden, R.: One in Three Smartphones Now Comes with NFC. NFC World (2013).
  6. 6.
    Bose, A., Shin, K.G.: On mobile viruses exploiting messaging and bluetooth services. In: Securecomm and Workshops 2006 (2006). doi: 10.1109/SECCOMW.2006.359562
  7. 7.
    Bradshaw, S.: An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities.
  8. 8.
    Brandt, N.B.: Automating NFC Message Sending for Good and Evil. Department of Computer Science, San Jose State University, Master’s Report (2014)Google Scholar
  9. 9.
    Caney, R., Dorros, C., Kennedy, S., Owens, G., Tague, P.: Mobile Pickpocketing: Exfiltration of Sensitive Data through NFC-Enabled Mobile Phones. Technical Report. Carnegie Mellon University (2013)Google Scholar
  10. 10.
    Carroll, A.: An analysis of power consumption in a smartphone. In: Proceedings of the 2010 USENIX Conference (2010)Google Scholar
  11. 11.
    Clark, S.: Wired publishes Lexus NFC ad. NFC World.
  12. 12.
    Cooper, D.: Barclays releases PayTag: The NFC card you glue to your phone. Engadget.
  13. 13.
    Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wirel. Pers. Commun. 71(3), 2259–2294 (2013). doi: 10.1007/s11277-012-0935-5 CrossRefGoogle Scholar
  14. 14.
    DeMott, J.: The evolving art of fuzzing. DEFCON 14 (2006)Google Scholar
  15. 15.
    Dunning, J.P.: Taming the blue beast: a survey of bluetooth based threats. IEEE Secur. Priv. 8(2), 20–27 (2010). doi: 10.1109/MSP.2010.3 CrossRefGoogle Scholar
  16. 16.
    Gligor, V.D.: A note on denial-of-service in operating systems. IEEE Trans. Softw. Eng. 10(3), 320–324 (1984). doi: 10.1109/TSE.1984.5010241 CrossRefGoogle Scholar
  17. 17.
    Haselsteiner, E., Breitfuß, K.: Security in near field communication (NFC). In: Workshop on RFID Security (RFIDSec) (2006)Google Scholar
  18. 18.
    Information Technology: Telecommunications and information exchange between systems—Near Field Communication—Interface and Protocol (NFCIP-1). Draft International Standard ISO/IEC 18092:2013Google Scholar
  19. 19.
    Keep Screen On Free: ByOne Coder. GooglePlay store.
  20. 20.
    Madlmayr, G., Langer, J., Kantner, C., Scharinger, J.: NFC devices: security and privacy. In: International Conference on Availability, Reliability and Security, 2008 (ARES ‘08) (2008). doi: 10.1109/ARES.2008.105
  21. 21.
    Maklia, T., Taimisto, J., Vuontisjarvi, M.: Fuzzing Bluetooth: Crash-testing bluetooth-enabled devices.
  22. 22.
    Martin, T., Hsiao, M., Ha, D.S., Krishnaswami, J.: Denial-of-service attacks on battery-powered mobile computers. In: IEEE Annual Conference on Pervasive Computing and Communications 2004 (PerCom ’04) (2004). doi: 10.1109/PERCOM.2004.1276868
  23. 23.
    Miller, C.: Exploring the NFC attack surface. In: Proceedings of BlackHat (2012).
  24. 24.
    Moyers, B.R., Dunning, J.P., Marchany, R.C., Tront, J.G.: Effects of Wi-Fi and bluetooth battery exhaustion attacks on mobile devices. In: Hawaii International Conference on System Sciences 2010 (HICSS ’10) (2010). doi: 10.1109/HICSS.2010.170
  25. 25.
    Mulliner, C.: Vulnerability analysis and attacks on NFC-enabled mobile phones. In: International Conference on Availability, Reliability and Security, 2009 (ARES ’09) (2009). doi: 10.1109/ARES.2009.46
  26. 26.
    Mulliner, C.: Attacking NFC mobile phones. In: EUSecWest 2008 (2008)Google Scholar
  27. 27.
    Mulliner, C.: Hacking NFC and NDEF. In: NinjaCon 11 (B-Sides) (2011)Google Scholar
  28. 28.
    NFC Forum: NFC Data Exchange Format (NDEF) Technical Specification.
  29. 29.
    NFC Forum: What is NFC? About the Technology.
  30. 30.
    Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of Service Attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257. Second Quarter (2011). doi: 10.1109/SURV.2011.041110.00022
  31. 31.
    Racic, R., Ma, D., Chen, H.: Exploiting MMS vulnerabilities to stealthily exhaust mobile phone’s battery. In: Securecomm and Workshops 2006, 28 August–1 September, 2006. doi: 10.1109/SECCOMW.2006.359550
  32. 32.
    Robotium: The World’s leading Android test automation framework.
  33. 33.
    Roland, M., Langer, J., Scharinger, J.: Practical attack scenarios on secure element-enabled mobile devices. In: International Workshop on Near Field Communication (NFC), 2012 (2012). doi: 10.1109/NFC.2012.10
  34. 34.
    Roland, M., Langer, J., Scharinger, J.: Applying relay attacks to Google Wallet. In: International Workshop on Near Field Communication (NFC), 2013 (2013). doi: 10.1109/NFC.2013.6482441
  35. 35.
    Sosonoski, D.: Java programming dynamics, part 2: introducing reflection. In: IBM developerWorks (2003).
  36. 36.
    Stirparo, P.: A fuzzing framework for the security evaluation of NDEF message format. In: 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN ’13), pp. 165–170, June 5–7, 2013. doi: 10.1109/CICSYN.2013.58
  37. 37.
    Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Pearson Education, London (2007)Google Scholar
  38. 38.
  39. 39.
    Van Damme, G., Wouters, K., Preneel, B.: Practical experiences with NFC security on mobile phones. In: Proceedings of the Workshop on RFID Security and Privacy 2009 (RFIDSec ’09)Google Scholar
  40. 40.
    Verdult, R., Gans, G., Garcia, F.: A toolbox for RFID protocol analysis. In: IEEE Fourth International EURASIP Workshop on RFID Technology (EURASIP RFID), 28–29 September 2012Google Scholar
  41. 41.
    Verdult, R., Kooman, F.: Practical attacks on NFC enabled cell phones. In: 3rd International Workshop on Near Field Communication (NFC), 2011, pp. 77–82 (2011). doi: 10.1109/NFC.2011.16
  42. 42.
    Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. In: Proceedings of the 11th Annual Digital Forensics Research Conference (DFRWS 2011), vol. 8, pp. S14–S24 (2011)Google Scholar
  43. 43.
    Von Behren, R., Wall, J.: Coming soon: make your phone your wallet (2011). Google: Official Blog.
  44. 44.
    Wiedermann, N.: Fuzzing-to-go: A Test framework for Android Devices. Master’s thesis. Technische Universität München (2013)Google Scholar
  45. 45.
    WugFresh: Nexus Root Toolkit v1.8.2.
  46. 46.
    Yang, Z.: PowerTutor-A Power Monitor for Android-Based Mobile Platforms.
  47. 47.
    Zhang, L.: NFC Application Development on Android with Case Studies. Intel Developer Zone (2013).

Copyright information

© Springer-Verlag France 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceSan Jose State UniversitySan JoseUSA

Personalised recommendations