Explore the security implications of Near Field Communication (NFC) technology in mobile devices through this Black Hat USA 2012 conference talk. Delve into the NFC protocol stack, learn fuzzing techniques for two devices, and discover the potential vulnerabilities in software built on top of NFC. Examine how technologies like Android Beam and NDEF content sharing can be exploited to parse various file types without user interaction. Uncover the possibility of complete phone takeover via NFC, including theft of personal data and unauthorized actions. Gain insights into the NFC attack surface, from low-level waveforms to high-level code vulnerabilities, and understand the risks associated with this emerging payment technology. Follow along as the speaker demonstrates real-world exploits, including a Word document heap overflow and Bluetooth pairing manipulation, highlighting the importance of security awareness in NFC-enabled devices.
Don't Stand So Close To Me - An Analysis of the NFC Attack Surface