COMPUTING SCIENCE POS Terminal Authentication Protocol to Protect EMV Contactless Payment Cards

نویسندگان

  • Martin Emms
  • Budi Arief
  • Joseph Hannon
  • Aad van Moorsel
  • M. Emms
  • A. van Moorsel
چکیده

The original EMV protocol was designed to operate in a situation where the card holder removes their card from their wallet and insert the card into a Point of Sale (POS) terminal. The protocol operates predominantly in plaintext which was not a problem because the attackers needed to tamper with the POS to gain access to the information on the card. The introduction of contactless EMV cards exposes the mainly plaintext EMV protocol to a wireless interface. This allows attackers to use an off-the-shelf NFC reader to access the card without the cardholders knowledge and potentially whilst the card is still in their wallet. Research has demonstrated that contactless EMV cards are vulnerable to various attacks carried out using off-the-shelf equipment which is both cheap and easy to obtain. The proposed solution addresses these issues by having the card request that any NFC reader, attempting to initiate communication, must authenticate itself as a genuine bank issued POS. The POS does this using a Bank issued private key to sign a nonce provided by the card. About the authors Martin Emms is studying for a research PhD at Newcastle University's Centre for Cybercrime and Computer Security (CCCS). My research into potential vulnerabilities in the EMV payments system brought about by the introduction of Near Field Communications (NFC) payment technologies (i.e. NFC payment cards, mobile phone payments applications, NFC payment tags and NFC payment / top-up wrist bands). Supervised by Professor Aad van Moorsel with the School of Computing Science at Newcastle University. Martin has also been working with a local womenʼs support centre in the North East of England to better understand the issues faced by survivors of domestic violence. The main focus of this research has been enabling survivors to access online / electronic domestic violence support services without the fear of being caught by their abuser. His role has been to design new applications that can help survivors access support services without leaving tell-tale electronic footprints. Budi obtained his Bachelor of Computing Science with First Class Honours from Newcastle University in 1997. He had a one year placement (industrial training) during his undergraduate study with Mari Computer System Ltd. from 1995 to 1996. He went on to study for a PhD at Newcastle University with a scholarship from the School of Computing Science and an Overseas Research Studentship (ORS) from the British Council. He completed his PhD in July 2001 with a thesis entitled "A Framework for Supporting Automatic Simulation Generation from Design". He currently works as a Research Associate at the School of Computing Science. He had previously worked as a Research associate on the TrAmS, TRACKSS, Rodin and DIRC projects, as well as a Teaching Fellow between October 2008 and September 2010. Joseph Hannon is a final year Computer Science student (at Newcastle University) on route to a 1st in his MComp. His research interests include credit card security, malware and mobile development. Aad van Moorsel is a Professor in Distributed Systems and Head of School at the School of Computing Science in Newcastle University. His group conducts research in security, privacy and trust. Almost all of the group's research contains elements of quantification, be it through system measurement, predictive modelling or on-line adaptation. Aad worked in industry from 1996 until 2003, first as a researcher at Bell Labs/Lucent Technologies in Murray Hill and then as a research manager at Hewlett-Packard Labs in Palo Alto, both in the United States. He got his PhD in computer science from Universiteit Twente in The Netherlands (1993) and has a Masters in mathematics from Universiteit Leiden, also in The Netherlands. After finishing his PhD he was a postdoc at the University of Illinois at Urbana-Champaign, Illinois, USA, for two years. Aad became the Head of the School of Computing Science in 2012.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices

Dutch banks introduced contactless payments in April 2014, and have been promoting the use of contactless cards since then. Contactless payments are based on the EMV specification, the worldwide standard for contact and contactless transactions. EMV Contact is a well-researched field and many vulnerabilities have been found. Although EMV Contactless is newer and less researched, a few vulnerabi...

متن کامل

Don’t trust POS terminals! Verify in-shop payments with your phone

Despite the advanced capabilities of the chip-enabled, debit and credit cards, fraud in payment transactions has not diminished it has shifted. The reason lies in the lack of a trusted communication path between the smartcard and the cardholder. More explicitly, because users have no means of verifying the authenticity of the Point-of-Sales (POS) terminal, they do not know how much they are abo...

متن کامل

e-EMV: Emulating EMV for Internet payments using Trusted Computing technology

The introduction of Static Data Authentication (SDA) compliant EMV cards with their improved cardholder verification and card authentication capabilities has resulted in a dramatic reduction in the levels of fraud seen at Point of Sale (POS) terminals. However, with this POS-based reduction has come a corresponding increase in the level of fraud associated with Internet-based Card Not Present (...

متن کامل

Relay Cost Bounding for Contactless EMV Payments

This paper looks at relay attacks against contactless payment cards, which could be used to wirelessly pickpocket money from victims. We discuss the two leading contactless EMV payment protocols (Visa’s payWave and MasterCard’s PayPass). Stopping a relay attack against cards using these protocols is hard: either the overhead of the communication is low compared to the (cryptographic) computatio...

متن کامل

Harvesting High Value Foreign Currency Transactions from EMV Contactless Cards Without the PIN

In this paper we present an attack which allows fraudulent transactions to be collected from EMV contactless credit and debit cards without the knowledge of the cardholder. The attack exploits a previously unreported vulnerability in EMV protocol, which allows EMV contactless cards to approve unlimited value transactions without the cardholder's PIN when the transaction is carried out in a fore...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013