@article{Hutter2010OntheSecurity,
  author        = {Michael Hutter and Thomas Plos and Martin Feldhofer},
  title         = {On the Security of RFID Devices Against Implementation Attacks},
  journal       = {International Journal of Security and Networks},
  year          = {2010},
  volume        = {5},
  pages         = {106--118},
  number        = {2/3},
  doi           = {10.1504/IJSN.2010.032209},
  keywords      = {RFID security; radio-frequency identification; implementation attacks; power analysis; electromagnetic analysis; side-channel analysis; fault analysis; passive RFID tags.},
  url           = {http://dx.doi.org/10.1504/IJSN.2010.032209},  
  abstract      = {Radio-Frequency Identification (RFID) is a wireless technology that already plays an important role in security-related applications. As soon as cryptographic features are integrated into RFID-enabled devices, the issue of implementation security becomes highly important. Implementation attacks exploit potential weaknesses of such devices and allow the extraction of sensitive information like secret keys. In this paper, we evaluate the efficiency of implementation attacks by conducting side-channel attacks and fault analysis on both High Frequency (HF) and Ultra-High Frequency (UHF) RFID tags. The results of our investigations disclose the potential vulnerability of RFID-tag implementations against practical attacks. Furthermore, this paper shows possible countermeasures that are optimised for resource-restricted devices like passive RFID tags.}
}