Credit: JONGHO SHIN / Getty Images Three computer science researchers are warning that viruses embedded in radio tags used to identify and track goods are right around the corner, a danger so far overlooked by the industry’s high interest in the technology.No radio frequency identification (RFID) viruses have been released live as of now, according to the researchers at Vrije Universiteit Amsterdam in the Netherlands. But RFID tags have several characteristics that could be engineered to exploit vulnerabilities in middleware and back-end databases, they wrote in a paper presented Wednesday at a conference in Pisa, Italy.“RFID malware is a Pandora’s box that has been gathering dust in the corner of our ‘smart’ warehouses and home,” the paper stated. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe The attacks can come in the form of a SQL injection or a buffer overflow attack even though the tags themselves may store only a small bit of information, the paper said. For demonstration purposes, the researchers created a proof-of-concept, self-replicating RFID virus. It took a master’s student at the university, Patrick Simpson, only four hours to write a virus small enough to fit on an RFID tag, something previously thought unworkable, said Andrew S. Tanenbaum, a professor at Vrije Universiteit Amsterdam. RFID tags can contain as little as 114 bytes of memory, he said.Tanenbaum expects vendors to be angry about the publishing of the code. Vendors have dismissed the possibility of RFID viruses, saying that the amount of memory in the tags is too small, he said. “You publish all of the code on the website, and all of [a] sudden, [vendors] are going to start panicking,” Tanenbaum said. “This hopefully will make them take it seriously. This is a wake-up shot before this stuff is deployed in a large scale.”The purpose of the exercise, the authors wrote, is to encourage RFID middleware designers to be more careful when writing code. Back-end middleware can contain millions of lines of source code, and if software faults number between six to 16 per 1,000 lines of code, the programs are likely to have many vulnerabilities, the paper said.RFID tags are increasingly being used in a variety of industries to track items and give a real-time view of inventories. The tags contain data on a particular object or, in some cases, embedded in animals, and that data is typically stored in a database.Companies can save money by using the tags to keep closer tabs on their property. However, this “pervasive computing utopia has its dark side,” the authors wrote.RFID systems may be attractive to criminals since the data contained on them may have a financial or personal nature, such as information stored on digital passports. In addition to causing damage to computer systems, RFID malware may have an effect on real-world objects, the paper said.Airports are looking to RFID tags to better track baggage. But Tanenbaum warned that this application could pose a large problem if an RFID tag is read and delivers a much larger set of data in return. A false tag on a piece of baggage could exploit a buffer overflow, delivering a virus to the RFID middleware, according to Tanenbaum. Once the virus code is on the server, it can infect the databases and corrupt subsequent tags or install “backdoors”–small programs that allow for the extrication of data over the Internet, he said.“You can hide baggage,” Tanenbaum said. “You can reroute baggage to the wrong place–all kinds of mischief. That’s I think a very, very serious thing that even has national security implications.”-Jeremy Kirk, IDG News ServiceFor related CIO content, read The RFID Imperative and RFID Tagging for Hospital Patients. For CIO sister publication CSO’s related content, check out What’s Your Frequency and Drug Makers Testing RFID Tags.For related news coverage, read CeBIT Lures IT Buyers and China to Use RFID for 1.3B ID Cards.Keep checking in at our CIO News Alerts page for updated news coverage. Related content brandpost Fireside Chat between Tata Communications and Tata Realty: 5 ways how Technology bridges the CX perception gap By Tata Communications Sep 24, 2023 9 mins Emerging Technology feature Mastercard preps for the post-quantum cybersecurity threat A cryptographically relevant quantum computer will put everyday online transactions at risk. Mastercard is preparing for such an eventuality — today. By Poornima Apte Sep 22, 2023 6 mins CIO 100 Quantum Computing Data and Information Security feature 9 famous analytics and AI disasters Insights from data and machine learning algorithms can be invaluable, but mistakes can cost you reputation, revenue, or even lives. These high-profile analytics and AI blunders illustrate what can go wrong. By Thor Olavsrud Sep 22, 2023 13 mins Technology Industry Generative AI Machine Learning feature Top 15 data management platforms available today Data management platforms (DMPs) help organizations collect and manage data from a wide array of sources — and are becoming increasingly important for customer-centric sales and marketing campaigns. By Peter Wayner Sep 22, 2023 10 mins Marketing Software Data Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe