Abstract
Traditionally, card emulation mode in Near Field Communication devices makes use of a hardware Secure Element (SE) as a secure storage and execution environment for applications. However, a different way of card emulation that bypasses the SE has emerged, referred to as Host-based Card Emulation (HCE). HCE relies on the phone CPU for processing power, sharing it with other running processes. This produces variable readings in terms of response times from the phone. This paper investigates this variability in HCE implementation as compared to an SE implementation. We also discuss how our findings may call into question the use of HCE in time critical scenarios
Original language | English |
---|---|
Title of host publication | 2015 First Conference on Mobile and Secure Services (MOBISECSERV) |
Publisher | IEEE |
Pages | 1-6 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-4799-7428-3 |
ISBN (Print) | 978-1-4799-7429-0 |
DOIs | |
Publication status | Published - 20 Feb 2015 |
Keywords
- Emulation, Smart phones, Protocols, Testing, Cryptography, Hardware, Smart cards