• If you are having problems logging in please use the Contact Us in the lower right hand corner of the forum page for assistance.

RFID Tags Virus Alert

Mike

Well-known member
Joined
Feb 10, 2005
Messages
28,480
Location
Montgomery, Al
Study Says Chips in ID Tags Are Vulnerable to Viruses

By JOHN MARKOFF
Published: March 15, 2006

A group of European computer researchers have demonstrated that it is possible to insert a software virus into radio frequency identification tags, part of a microchip-based tracking technology in growing use in commercial and security applications.

Radio frequency identity tags are growing in popularity because they are easily scanned.

In a paper to be presented today at an academic computing conference in Pisa, Italy, the researchers plan to demonstrate how it is possible to infect a tiny portion of memory in the chip, which can hold as little as 128 characters of information.

Until now, most computer security experts have discounted the possibility of using such tags, known as RFID chips, to spread a computer virus because of the tiny amount of memory on the chips.

The tracking systems are intended to improve the accuracy and lower the cost of tracking goods in supply chains, warehouses and stores. Radio tags store far more data about a product than bar codes and can be read more quickly. They have even been injected into pets and livestock for identification.

The chips have already prompted debate over privacy and surveillance, given their tracking ability. Now the researchers have added a series of worrisome prospects, including the ability of terrorists and smugglers to evade airport luggage scanning systems that will use RFID tags in the future.

In the researchers' paper, "Is Your Cat Infected With a Computer Virus?," the group, affiliated with the computer science department at Vrije Universiteit in Amsterdam, also describes how the vulnerability could be used to undermine a variety of tracking systems.

The researchers said they realized that there are risks associated with publishing security vulnerabilities in computerized systems. To head off some of the possible attacks they described, they have also published a set of steps to help protect RFID chips from such attacks.

The group, led by Andrew S. Tanenbaum, an American computer scientist, will make the presentation at the annual Pervasive Computing and Communications Conference sponsored by the Institute of Electrical and Electronic Engineers. Mr. Tanenbaum is the author of the Minix operating system, an experimental project that became the heart of the Linux open-source operating system.

The researchers asserted that the RFID demonstration had not used the commercial software that collects and organizes information from RFID readers. Rather, it used software that they designed to replicate those systems.

"We have not found specific flaws" in the commercial RFID software, Mr. Tanenbaum said, but "experience shows that software written by large companies has errors in it."

The researchers have posted their paper and related materials on security issues related to RFID systems at www.rfidvirus.org.

The researchers acknowledged that inside information would be required in many cases to plant a hostile program. But they asserted that the commercial software developed for RFID applications had the same potential vulnerabilities that have been exploited by viruses and other malicious software, or malware, in the rest of the computer industry.

One such standard industry problem is a software coding error referred to as a buffer overflow. Such errors occur when programmers set aside memory to receive data temporarily, but fail to require a check on the size of the value that is moved to the allocated space. A larger-than-expected value can cause the program to break and trick the computer operating system into executing a malicious program. "You should check all of your input all of the time, but experience shows this isn't the case," Mr. Tanenbaum said.

Independent computer security specialists also said RFID systems were potential problem areas.

"It shouldn't surprise you that a system that is designed to be manufactured as cheaply as possible is designed with no security constraints whatsoever," said Peter Neumann, a computer scientist at SRI International, a research firm in Menlo Park, Calif.

Mr. Neumann is the co-author of an article to be published in the May issue of the Communications of the Association for Computing Machinery on the risks of RFID systems. He said existing RFID systems were a computer security disaster waiting to happen.

He cited inadequate identification for users, the potential for counterfeiting or disabling tags, and the problem of weak encryption in a passport-tracking system being developed in the United States. But he said he had not previously considered the possibility of viruses and other malicious software programs.

An industry executive acknowledged that the companies that make computerized tracking systems faced potential security problems.

"We are very actively looking at the different way the technology is used," said the executive, Daniel P. Mullen, president of the Association for Automatic Identification and Mobility, an industry trade group. "It's an ongoing dialogue about protecting information on the tag and in the database."

The association has a working group of experts assessing both security and privacy challenges, he said.

There are many types of RFID tag, and some of the sophisticated versions include security features like encryption of the identifying number carried by the chip.

But the Dutch research group warned that in a variety of situations it is possible for attackers to alter the information in an RFID tag to subvert its purpose.

"RFID malware is a Pandora's box that has been gathering dust in the corners of our 'smart' warehouses and homes," they write in their paper.

In one example they offered, a virus from an infected tag on luggage passing through an airport could be picked up when it is scanned by the luggage-handling control systems and then spread to tags attached to other pieces of luggage.

Such an attack, they suggest, might spread luggage contamination to other airports. It might also be used by a smuggler to cause a piece of luggage to avoid security systems.

They also described situations of counterfeit RFID tags possibly being be used to subvert pricing and other aspects of commercial sales systems, or a virus could be inserted into RFID tags used to identify pets.
 
Mike said:
In one example they offered, a virus from an infected tag on luggage passing through an airport could be picked up when it is scanned by the luggage-handling control systems and then spread to tags attached to other pieces of luggage.

Oie, the ignorance of this article is astounding. First, most RFID tags do not have RAM (Random Access Memory), but rather ROM (Read Only Memory). The memory and programs contained by the RFID tag must be "burned" into the chip, something is IMPOSSIBLE to do with a scanner, which can only READ, not transmit.

So in order for a virus to propogated through the system, the RFID tags would have to be infected at the source, ie) the manufacturer's chip burning facility. Even if the scanner reads the infected chip, it would be read only as data, as the scanner itself has no operating system to allow a virus program to "execute", so it would show up in the database as bunch of garbage which the program wouldn't know what to do with. It would simply be impossible for the infected code to move from an infected RFID chip to a non-infected RFID chip, unless the scanners doing the reading had some way to write information out.

Perhaps some advanced luggage RFID allows for information to write back and forth, but cattle RFID tags are simply "dumb", read only tags. And there would be no way for the information to spread from the "smart" tag into other computer systems, unless those systems had a way to translate the information from being raw data to being executable program code.

Rod
 
The other night, I heard a woman on the radio ranting about how the government was going to use spy satellites to trace the chips that are going to be in the cattle tags. Interesting. You guys must have really good satellites to read a chip from outer space when an ordinary scanner needs to be within a foot of the tag in order to read it. :D :D

She was a goldmine of misinformation. :shock: Talking all about how people will need permission from the government to take the dog for a walk. She figured that every living thing in the country would be chipped and tracked by Big Brother. :roll:

Must have been the full moon....
 
Actually the lady is partly right- altho the type RFID tags now being considered probably can't be read by satellite-- there are devices small enough to be implanted under the skin or in a tag that can be- and they are in use now....When working with some of the federal boys (FBI & DEA) 25 years ago they had tracking devices and could track people and vehicles all over the country by satellite- this was before the public even knew the technology existed, so its hard telling what they have the capability of today......Some of that stuff they don't like to make public...

Will this be the childcare of the future?

------------------
Spying on your teens via satellite for $600
By Danielle Teutsch
October 5, 2003
The Sun-Herald





Tracking units to monitor children and teenagers - disguised as watches, mobile phones and belts - have hit Australia to the outrage of civil libertarians and parent groups.

The latest in spy gadgets available in Australia are being marketed to anxious parents.

They include a computer device and software that can record email and chatroom conversations and a clothing spray that can tell if teens are having sex.

Australian company Internav's mobile phone-sized Global Positioning System (GPS) tracking device has emergency alarm button and software so parents can zoom in on a child's whereabouts using a home computer. It costs $895.

Managing director Graham Thomas said he expected the main buyers to be parents of teenage girls.

"Teenage girls going out at night who go home on a bus or by taxi - this is really for the peace of mind of their parents," he said.

Geoff Day from Kid Safe System Locators, said his GPS devices, which will be in stores by Christmas, would help find children in cases of abduction or accidents such as drowning. They can be hidden in watches, belts and jewellery and cost from $600 to $700.
 
Darby Holladay (301) 734-3265
Jerry Redding (202) 720-6959


USDA OFFICIALS TO HOLD MICROCHIP MEETING
WASHINGTON, March 15, 2006–The U.S. Department of Agriculture's Animal and Plant Health Inspection Service will hold a series of informational meetings to discuss the use of microchipping to identify animals covered under the Animal Welfare Act (AWA).

The first meeting will be held in Riverdale, Md., Tuesday, March 21. Additional meetings will be held in the following locations: Boston, Mass., March 29; Baton Rouge, La., April 4; Springfield, Mo., April 18; Centennial, Colo., April 25 and San Diego, Calif., May 10.

The meetings will provide an opportunity to discuss criteria established by the International Standards Organization, which specifies technology for unencrypted chips. Use of this technology allows access to improved contact information during scanning and is consistent with requirements in other countries. APHIS will review all of the information collected at these informational meetings and through the public comment period and determine what if any action can be taken.

Under the AWA, APHIS has the authority to regulate most warmblooded animals being used for exhibition, research and the wholesale pet trade, as well as the transportation of these animals in commerce. APHIS currently requires individual identification for dogs and cats used for research or wholesale trade. Animals are currently identified by tags, tattoos or collars. Microchipping is also allowed, but must be approved in advance.

The public meetings will be held at the following addresses:

· USDA Center at Riverside, 4700 River Road, Riverdale, Md., $2.25 is required for parking;
· The Harvard Club, 370 Commonwealth Ave., Boston, Mass., parking is $8.00 per hour;
· USDA, 5825 Florida Boulevard, Baton Rouge, La.;
· University Plaza Hotel and Conference Center, 333. S. John Q. Hammons Parkway, Springfield, Mo.;
· South Denver Chamber of Commerce, 6840 South University Boulevard, Centennial Colo.;
· Homewood Suites Hilton, 11025 Vista Sorrento Parkway, San Diego, Calif.

Agenda information is available at www.aphis.usda.gov/ac.

Notice of the series of meeting was published in the March 10 Federal Register.

- more -
- 2 -

Consideration will be given to comments received on or before Sept. 6. Send an original and three copies of postal mail or commercial delivery comments to Docket No. APHIS-2006-0012 , Regulatory Analysis and Development, PPD, APHIS, Station 3A-03.8, 4700 River Road, Unit 118, Riverdale, Md. 20737-1238. If you wish to submit a comment using the Internet, go to the Federal eRulemaking portal at http://www.regulations.gov and, in the "Search for Open Regulation" box, select "Animal and Plant Health Inspection Service" from the agency drop-down menu, then click on "Submit." In the Docket ID column, select APHIS-2006-0012 to submit or view public comments and to view supporting and related materials available electronically.

Comments are posted on the Regulations.gov Web site and may also be reviewed at USDA, Room 1141, South Building, 14th St. and Independence Ave., SW, Washington, D.C., between 8 a.m. and 4:30 p.m., Monday through Friday, excluding holidays. To facilitate entry into the comment reading room, please call (202) 690-2817.

#

Note to Reporters: USDA news releases, program announcements and media advisories are available on the Internet. Go to the APHIS news release page at http://www.aphis.usda.gov/lpa/newsroom/. Also, anyone with an e-mail address can sign up to receive APHIS press releases automatically. Send an e-mail message to [email protected] and leave the subject blank. In the message, type
subscribe press_releases.
 

Latest posts

Back
Top