23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

malicious SQL <strong>in</strong>jection code is executed at the backend database (Rieback et al.,<br />

2006).<br />

Figure A6.12: Fake tag is read by the <strong>RFID</strong> reader<br />

6. Detail Procedures of a Replicated Attack Example and F<strong>in</strong>d<strong>in</strong>gs after<br />

the Attack<br />

Step 1: Configure the <strong>RFID</strong> reader.<br />

Step 2: Synchronize reader’s clock with the TEST-STATION.<br />

66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!