RFID Middle Ware
RFID Middle Ware
University of Houston
Bauer College of Business
Spring 2007
Standards
Integration
EPCglobal Network
Set of global technical standards aimed at enabling
automatic and instant identification of items in the supply
chain and sharing the information throughout the supply
chain
Sun
SAP
Microsoft
Oracle
Sun’s RFID Software Architecture
Sun’s Event Manager
Sun’s Information Server
SAP
Threats to RFID Middleware
(Source: www.rfidvirus.org)
Why RFID systems are vulnerable to
attacks
Lots of source code
Generic protocols
Back-end databases
High-value data
False sense of security
RFID-Based Exploits
Buffer Overflows
The life of a buffer overflow begins when an attacker inputs
data either directly (i.e. via user input) or indirectly (i.e. via
environment variables).
This input data is deliberately longer then the allocated end
of a buffer in memory, so it overwrites whatever else
happened to be there.
Since program control data is often located in the memory
areas adjacent to data buffers, the buffer overflow can
cause the program to execute arbitrary code
RFID-Based Exploits
Buffer Overflows
RFID tags are limited to 1024 bits or less
Code Insertion
Malicious code can be injected into an application
by an attacker, using any number of scripting
languages including VBScript, CGI, Java,
JavaScript, and Perl
RFID-Based Exploits
SQL injection
SQL injection is a type of code insertion attack that tricks a
database into running SQL code that was not intended.
Attackers have several objectives:
They might want to enumerate (map out) the database
structure. Then, the attackers might want to retrieve
unauthorized data, or make equally unauthorized
modifications or deletions.
Databases also sometimes allow DB administrators to
execute system commands. A system command can be used
to attack the system
RFID-Based Worms
Worm is a program that self-propagates across a network,
exploiting security flaws in widely-used services
What is middleware
EPC Global
Savant
Vendors
Functionality
Architecture
Threats