This device can do almost anything involving almost any kind of low-(~125 kHz) or high-(~13.56 MHz) frequency RFID tag. It can act as a reader. It can eavesdrop on a transaction between another reader and a tag. It can analyze the signal received over the air more closely, for example to perform an attack in which we derive information from the tag's instantaneous power consumption. It can pretend to be a tag itself. It is also capable of some less obviously useful operations that might come in handy for development work.
Y. Elovici, B. Shapira, и A. Maschiach. WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, стр. 63--70. New York, NY, USA, ACM, (2002)
D. Schall, и F. Skopik. Proceedings of the 15th international conference on Advances in databases and information systems, стр. 285--301. Berlin, Heidelberg, Springer-Verlag, (2011)
R. Agrawal, J. Gehrke, D. Gunopulos, и P. Raghavan. SIGMOD '98: Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, стр. 94-105. ACM Press, (1998)
H. Zhang, M. Korayem, E. You, и D. Crandall. Proceedings of the fifth ACM international conference on Web search and data mining, стр. 33--42. New York, NY, USA, ACM, (2012)