Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo

 

Unsupported browser: Your browser does not meet modern web standards. See how it scores »

In a packed room at the Black Hat computer security conference in Las Vegas yesterday, an Android smartphone was tapped with a white plastic card, and within seconds it was running malicious code that allowed an attacker to remotely access the device.

The demonstration was given by high-profile hacker Charlie Miller, who was the first person to demonstrate a way to seize control of the iPhone, in 2007, and who has demonstrated many novel attacks on Apple devices since. He outlined a number of reasons why the contactless near-field communication, or NFC, chips appearing in smartphones will bring new security worries as well as convenient new features—a talk that was the result of nine months of research. “There’s going to be a lot of phones coming out with this technology, and so it would be nice to know if there’s any security problems in it,” said Miller.

A smartphone with an NFC chip can be used to pay for items when tapped on a reader (see “A New Kind of Smartphone Connection”). The device uses weak radio waves to communicate either with another NFC device in close range or with passive tags such as those used by some mass transit payment cards.

Google is positioning NFC as a major feature of its Android operating system, in support of its Google Wallet payments service (see “Google Wallet: Who’ll Buy In?”). Several Android phones with NFC are already available; Nokia has released some models and has plans for more; and Apple is rumored to be adding NFC to future iPhones.

Miller believes the influx of NFC devices could bring problems. “NFC is cool [for hackers] because you don’t need to have the user do anything,” said Miller. In contrast, in order to compromise a computer or non-NFC phone, criminals typically have to trick users into doing something out of the ordinary, such as opening a Web page or e-mail attachment they shouldn’t.

Miller’s Android NFC hack was made possible by a feature called Android Beam, which allows phones with NFC chips to exchange photos and other data. An NFC-equipped phone can send a URL to another when the two are tapped together, and the receiving device will open the page without offering the user a chance to decline. Miller created a passive NFC tag that mimicked a phone using Android Beam to send a Web address, and made use of a bug in Google’s browser previously discovered by researchers at security startup CrowdStrike to gain control (see “How a Web Link Can Take Control of Your Phone”).

NFC interactions typically require being within four centimeters of a phone, says Miller, so using such attacks against a person in the street would be difficult. “A more realistic attack is replacing an NFC reader [for accepting payments], in a cab or somewhere else, with a malicious one,” he said. Passive NFC tags are increasingly being used in posters and other marketing materials and could be used for such attacks, too.

Miller also presented evidence that sending a corrupt NFC signal to a contactless phone could cause it to access and run malicious code. He probed for weaknesses in Nokia and Google’s NFC software by sending tens of thousands of slightly modified signals to see if any would cause problems. Miller said that he has found several promising bugs that could allow the execution of code to steal data or take control of a device.

Hear more from Google at EmTech 2014.

Register today

0 comments about this story. Start the discussion »

Tagged: Web, Google, smartphone, Black Hat, hacker, NFC

Reprints and Permissions | Send feedback to the editor

From the Archives

Close

Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me
×

A Place of Inspiration

Understand the technologies that are changing business and driving the new global economy.

September 23-25, 2014
Register »