Home » Knowledge » Content
Product Categories

Mifare technolog (4)---Attack events

- May 03, 2018 -

Attack events

In December 2007, Henryk Plötz and Karsten Nohl [6] published some of the reverse engineering techniques for MIFARE chip algorithms at the communicative exchange conference.

In March 2008, a digital security research group at the Radboud University Nijmegen in the Netherlands published a copy of the balance on an electronic ticket OV card (ov-chipkaart) copied and modified using MIFARE Classic technology using reverse engineering. Nijmegen University has published the following three documents on MIFARE Classic:

A Practical Attack on the MIFARE Classic

Dismantling MIFARE Classic

Wirelessly Pickpocketing a MIFARE Classic Card

NXP Semiconductors tried to file a lawsuit in a Dutch court to prevent the publication of these documents, but the judge considered this to be freedom of speech and rejected NXP's proposal.

In August 2008, in the 17th USUNIIX, there was another report on how to use reverse engineering to publish.

Professor Taida Motor demonstrated and tampered with the EasyCard: In July 2010, Zheng Zhenduo, a professor at the Department of Electrical Engineering of National Taiwan University, used an improved Sniffer-Based attack to attack Mifare cards. To use one leisure card in normal use, change the balance from plus 100 yuan to minus five hundred yuan.

Information Security Advisor tampered with EasyCard: In July 2011, a 24-year-old information security consultant from a technology company announced that he purchased a card reader on a US website and then downloaded an American student to crack the post of the Boston Metro Charlie Card. Four months to write the program, break the card protection system, a self-made card reader for the convenience card tampered with the value of the success and stealing six times