A Security Analysis of NFC Implementation in the Mobile Proximity Payments Environment

Size: px
Start display at page:

Download "A Security Analysis of NFC Implementation in the Mobile Proximity Payments Environment"

Transcription

1 A Security Analysis of NFC Implementation in the Mobile Proximity Payments Environment Security Task Force (STF) Version 2.0 Published by Mobey Forum - June 2013 Copyright 2013 Mobey Forum

2 Copyright 2013 Mobey Forum All rights reserved. Reproduction by any method or unauthorised circulation is strictly prohibited, and is a violation of international copyright law. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 0 / 22

3 Security Task Force (STF) Chair Mario Maawad la Caixa Contributors Matias Seppovaara Alexander Luijt Zafar Kazmi Niall O'Donoghue Natalí Melgarejo Ira McDonald Douglas Kinloch Ville Sointu Nordea UL la Caixa Trusted Computing Group / Nokia GMV Trusted Computing Group / Samsung Electronics Metaforic Tieto Keywords application developers, card cloning, card skimming, contactless, denial of service, encryption, data insertion, data modification, eavesdropping, ghost and leech attack, man in the middle, mobile payment application, mobile financial services, near field communication (NFC), NFC enabled mobile devices, phishing, physical layer, proximity payment system environment, risks, secure channel, secure element (SE), secure management, security, service in payment card, tags, triggers, threats, untrusted, verification, vulnerabilities Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 0 / 22

4 Table of Contents 1. Executive Summary Introduction Security Trends in NFC Enabled Mobile Devices Vulnerabilities Untrusted Communication Channel Denial of Service in the Physical Layer of Communication Denial of Service In Payment Cards No Encryption in Communications Threats Ghost and Leech Attack Eavesdropping Data Modification Denial of Service Phishing Man in the Middle Card Cloning and Skimming Mobile Payment Application Development Risks Access to the Secure Element Automatic Actions in Mobiles Triggered by NFC Tags Recommendations for Enhancing the Security Eavesdropping Data Corruption Data Modification Data Insertion Man in the Middle Secure Channel for NFC Use Tags Signed by Legitimate Entities Cancel Automatic Actions Associated to Tags Verification of Mobile Applications Applications and Firmware Updates Conclusions Citations & References Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 1 / 22

5 List of Abbreviations Term AI APDU CA CDA CDMA CVC DDA IC ISD OS OTA PAN PKI POS SD SDA SE SIM SP SSD SSL TLS TSM USIM Description Application Issuer Application Protocol Data Unit Certificate Authority Combined Data Authentication Code Division Multiple Access Card Verification Value Dynamic Data authentication Integrated Circuit Issuer Security Domain Operating System Over The Air Primary Account Number Public Key Infrastructure Point of Sale Secure Digital Static Data Authentication Secure Element Subscriber Identity Module Service Provider Supplemental Security Domain Secure Socket Layer Transport Layer Security Trusted Service Manager Universal Subscriber Identity Module Table 1. Abbreviations used in the paper Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 2 / 22

6 1. Executive Summary The mobile device aims to replace our bulky physical leather wallets in the near future. A number of countries around the globe are already involved in various mobile wallet and mobile payment related initiatives based on near field communication (NFC) technology. The new services have created many opportunities for new business models, but they also bring new security risks and threats. This document presents an overview of the current security trends related to the mobile payments market. It outlines NFC technology related threats and vulnerabilities, and explains how these could affect the entire contactless payment ecosystem. Chapter three of the paper summarises the vulnerabilities and threats in NFC mobile services and offers a description of the risks NFC functionalities face today and are likely to face in the future. Chapter four describes the countermeasures recommended to manage these vulnerabilities and threats. Stakeholders within the NFC ecosystem need to take these recommendations into account to ensure that end users have the best possible service that works in a secure manner. Chapter five concludes that for a successful mobile payments landscape, all stakeholders in the ecosystem need to work together to ensure secure and efficient NFC services. The final chapter summarises the recommendations for developing secure NFC services. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 3 / 22

7 2. Introduction There is concrete evidence that criminals are already trying to compromise mobile devices for financial gain, and these attacks will undoubtedly become more sophisticated over time. At the same time, current security strategies are not keeping up with the rapid changes in the mobile financial services (MFS) environment. This year will see yet more banking clients opt for mobile banking, mobile payments and other MFS. The growing threat of cybercrime related to mobile devices requires the industry to establish a deeper understanding of current and future threats, vulnerabilities and weaknesses in the mobile environment. Intelligence gathering and awareness of future threats are important if the countermeasures needed to enhance the security of the stakeholders and related technologies within the MFS ecosystem are to be appropriately deployed. The application examples of NFC technology presented in this paper are not limited to payments, but can also be deployed to home banking, ticketing and loyalty programs, to name a few. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 4 / 22

8 3. Security Trends in NFC Enabled Mobile Devices In order to effectively develop a set of precautionary recommendations that could enhance the security of the NFC payment environment, it is necessary to outline and analyse the existing vulnerabilities and threats within the NFC based payment ecosystem Vulnerabilities Untrusted Communication Channel There are no controls set up in the communication layer between the NFC device and the point of sale (POS). It is not possible for both devices to be authenticated in a non-reliable communication channel; leaving the path clear for an identity hijacking in case the NFC device or the POS is replaced. If a POS is replaced, then the confidentiality is compromised, allowing the attacker to obtain card data such as the primary account number (PAN), the expiration date, the cryptogram and the name of the cardholder if the card should contain it Denial of Service in the Physical Layer of Communication A denial of service can be obtained by sending data at the same frequency as the NFC communication channel. In this case, communication between the POS and the contactless device will be compromised and the communication channel will be disabled. The issue here is that the interference signal must be stronger than the signal used by the POS in the NFC communication Denial of Service in Payment Cards Each card has an internal transaction counter. If the card limit is exceeded, the card is disabled. There is also a safety mechanism that disables the card after three incorrect attempts to enter the personal identification number (PIN) offline. An attacker could impersonate a POS enabling them to interact with the card causing denial of service or exceed the limit of failed transactions or PIN attempts No Encryption in Communications Within current NFC based payment implementations, there is no encryption protocol being used in the communication between the POS and the contactless payment NFC device. This can enable Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 5 / 22

9 an attacker, with the proper hardware 1, to intercept the communication channel. The data captured can include the PAN, expiry date, cryptogram and cardholder s name. It is relevant to state that although this data can be successfully captured and the confidentiality could be compromised as a result of this, it is very difficult to carry out a fraudulent payment using this information, for the following reasons: A magnetic stripe CVC is required to make card payments (in the majority of cases); this CVC is printed on the magnetic stripe and not transmitted. To perform fraudulent payments over the internet, the CVC2 (also known as CVV2) is needed, which is printed on the back of the card and is not transmitted. Today, most internet sites require the CVC2 code to be entered before a transaction can be made, however, there are still some internet sites which do not request this information from their customers. It is necessary to recalculate the cryptogram to perform a fraudulent transaction by altering the data. In order to do this, the card key must be known and this key is not actually transmitted during the transaction process Threats Ghost and Leech Attack In this attack, the ghost acts as a card and the leech as a reader. The hacker s reader or leech transmits the card credentials to fake radio frequency identification (RFID) card. The ghost and leech attack does not need to modify or manipulate the contents of the communications between the reader and the payment card; this attack only needs to relay the communications in a black box manner. In this case, cryptography won t defend the data security against this attack 2 because the attack does not interfere with either the input or output of transaction authentication. It has been proved that the attack deployment is possible and costs are within the expected returns of fraud Eavesdropping NFC technology uses radio frequency (RF) as the link to communicate. Hence an attacker with the appropriate antenna can receive the signal that is transmitted between NFC devices. The main issue here is the close proximity of the devices and the attacker to enable them to successfully eavesdrop. Stealing data using this attack depends on specific parameters, such as the RF field characteristic of the given sender, the attacker s antenna, the quality of the attacker s receiver 1 Some experiments have achieved this conclusion using the Proxmark3 2 Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J. Murdoch Computer Laboratory, University of Cambridge Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 6 / 22

10 and the attacker s signal decoder. As it is proven that it is possible and indeed practical to eavesdrop on communicating NFC devices, there should be no doubt that NFC communication needs to be combined with some kind of security protocol. Figure 1: Ghost and Leech Attack as a Relay attack. Innocent customer, Alice pays a short amount of money by entering her PIN into an untrusted terminal operated by Bob. Meanwhile, Carol uses a fake card in the trusted terminal at Dave s store. The result is that Alice is paying for Carol s diamond without knowing it. (Source: From the paper Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. Permission to use image from Saar Dimer.) Data Modification The attack allows the data to be received by the reader device, but is manipulated. Data modification is not as simple to achieve as it strongly depends on the amplitude modulation of the signal and the signal encoding. The attacker needs to change pauses into signals and as an effect, the reader receives modified signals. If the data being transmitted is encrypted, then the modified signals will result in a corrupted message, because the attacker cannot choose to alter the signals to change the meaning of the message Denial of Service The only purpose of this type of attack is to interrupt the communication between NFC devices. The attack is relatively simple to achieve with the appropriate hardware but difficult to prevent Phishing By replacing a tag on an NFC based smart poster, an attacker can deceive and force the user to visit websites with the same look and feel, but those sites are actually fake and malicious. For 3 Gauthier Van Damme, Karel Wouters. Katholieke Universiteit Leuven, Belgium. Practical Experiences with NFC security on Mobile phones. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 7 / 22

11 instance, in the case of an NFC poster, which enables customers to acquire a bus ticket by sending an SMS, it is simple for an attacker to alter the telephone number so that users are directed to a premium rate number instead. Users may not pay too much attention to the numbet and may end up paying a much higher amount as a result. Errors or deficiencies in the user's mobile device graphic user interface (GUI) could also be used to trick the user into visting an incorrect website or contacting a premium number. This situation can be even more serious if the GUI is mixed with user information and the information provided by the NFC tag. A simple attack is to create a smart poster with a URL that directs the user to download malware unknowingly. If a supermarket uses NFC tags, a criminal could replace the tag of a product with a similar but cheaper tag 4. Other tags can be used for the Wi-Fi setup (for printer or internet access, etc.) or to provide configuration parameters and keys stored in an NFC tag. If the contents of the tag have been modified or replaced by a malicious label, visitors may not have a connection or could be connecting to a malicious access point, believing that they are connected to the correct network. In the final scenario, all network traffic can be easily intercepted if the communications do not use strong end-to-end security (SSL or TLS) Man in the Middle As NFC devices can detect jamming or changes in the signal because they can detect collisions, a man in the middle attack is not possible at the communication layer due to collision detection Card Cloning and Skimming Card cloning and skimming are two prominent attacks on contactless systems that are often the subject of practical research. The skimmer is a hidden electronic device that intercepts the card data and tries to collect its information. A skimmer may allow an active relay attack by eavesdropping and altering messages. This attack is also called a wedge attack, which has been demonstrated in the Chip and PIN is Broken 6 paper. This study demonstrates how to successfully steal cards without knowing the PIN. EMV (a global standard for credit and debit payment cards based on chip card technology) cards are the most commonly used, especially in Europe; there is therefore a lot of research regarding EMV data authentication. Depending on the chip technology, three methods are available: Static Data Authentication (SDA) Dynamic Data Authentication (DDA) Combined Data Authentication (CDA). 4 M.R. Rieback, B. Crispo, and A.S. Tanenbaum, The evolution of RFID security. Pervasive Computing IEEE, IEEE, 5(1):6269, Jan.-March Ernst Haselsteiner and Klemens Breitfu, Security in near field communication (NFC), en Workshop on RFID Security, RFIDSec 06. Philips Semiconductors, July Chip and Pin is Broken Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond, University of Cambridge 2010 Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 8 / 22

12 In 2011, Visa and MasterCard mandated that all EMV cards must use DDA. SDA cards can be cloned and used without a PIN for offline transactions only. DDA card clones are ineffective for offline and online transactions, however a valid DDA card can be used to pass offline authentication and perform fake offline transactions (not tied to authentication). CDA is designed to protect against this attack but it should still be possible for the skimmer to force usage as an SDA card Mobile Payment Application Development Risks According to the Open Web Application Security Project (OWASP), mobile applications in general need to take into account the following risks when installing onto the mobile operating system (OS) 7. Insecure data storage Weak server side controls Insufficient transport layer protection Client side injection Poor authorisation and authentication Improper session handling Security decisions via untrusted inputs Side channel data leakage Broken cryptography Sensitive information disclosure Access to the Secure Element There are various ways of accessing the secure element (SE) 8. Although some of these methods use sophisticated access control capabilities, the common flaw is their confidence in the security of the mobile OS to perform access control enforcement. In all cases, the SE relies on the OS or application processor's access control decisions. In this case, the application only needs to pass the security checks performed by the mobile OS to exchange messages with the SE. This is a very important issue considering that there is a trend to exploit different mobile device platforms in order to gain root access to the OS. If this is possible, many security checks can be bypassed and the SE compromised. Basically, the SE is as secure as a regular contactless smartcard, as the two have the same security features: secure storage, secure execution environment, hardware-based cryptography and certified high security standard. To enable access to the data and services in the SE, an application programming interface (API) between the applications on the phone and the SE is needed. There 7 OWASP Mobile Security Project 8 M. Roland, J. Langer, and J. Scharinger: Practical Attack Scenarios on Secure Element-enabled Mobile Devices. In Proceedings of the Fourth International Workshop on Near Field Communication (NFC 2012), pp , Helsinki, Finland, Mar Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 9 / 22

13 are two Java interfaces to the SE: JSR177 that enable access to the SIM card and the JSR 257 which enables access to the NFC chip. If the mobile phone does not support Java, the mobile device manufacturer and / or OS issuer must offer an API to access the SE and NFC chip. In all cases, APIs are a way of access control, which is always enforced by the OS on the application processor. The API ultimately trusts the OSs access control and the underlying mobile hardware. This makes the API vulnerable in front of malicious software with privilege escalation exploits 9. Even the end user can be a threat if he jail breaks the mobile phone, bypasses major security measures intentionally or unintentionally, or installs non-qualified applications Automatic Actions in Mobiles Triggered by NFC Tags Smart posters include a field called action, which allows the attacker to take any action they want with commands through the NFC connection. Examples of these actions are: Modifying a contact from the agenda of the mobile phone. Making calls and sending text messages. Starting Bluetooth connections and sending data. Allowing the user to open a malicious URL. For this, there are Android exploits contaminating the user s mobile phone with malware. Here is a practical example of how an NFC enabled phone can be used for criminal purposes: When the criminal is aware of a forthcoming meeting, pre-programmed tags can be glued under the table. When a participant places their phone on the table, it reads the tag, opens a call to a pre-programmed number and enables the receiving end to hear the conversation in the room. 9 For Android OS, some examples are: mempodroid, Levitator, zergrush, GingerBreak, ZimperLich, KillingInTheName, RageAgainstTheCage, Exploid Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 10 / 22

14 4. Recommendations for Enhancing the Security 4.1. Eavesdropping The wireless nature of NFC technology makes it impossible to protect against eavesdropping without the use of encryption. Although data transmitted in passive mode is significantly more difficult to be eavesdropped, this is not sufficient for most applications to transmit sensitive data. The only solution to this attack is to set up a secure channel as descbired in section 4.6 of this paper Data Corruption NFC devices can be protected from data corruption as they are able to verify the signal status while they are transmitting data, therefore enabling the NFC device to detect the attack. The power needed to corrupt the data is also significantly higher than the power, which can be detected by the NFC device Data Modification Protection against data modification can be achieved in various ways; in this case the following two methods are preferred. 1. Option one: The NFC device checks the RF field while sending. This means the sender could continuously check for such an attack and could stop the data transmission when an attack is detected. 2. Option two (and probably the better solution): develop a secure channel, as described in section 3.6 of this paper Data Insertion There are three possible countermeasures. 1. Option one: The answering device answers with no delay. In this case the attacker cannot be faster than the correct device and can only be as fast as the correct device. If two devices answer at the same time, no correct data is received. 2. Option two: Use the answering device to listen to the channel between the opening of the channel and the start of the transmission. The device can then detect an attacker attempting to insert data. 3. Option three: Create a secure channel between the two devices. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 11 / 22

15 4.5. Man in the Middle As already said in section 3.2.6, it is practically impossible to undertake a man in the middle attack on an NFC communication channel. As a countermeasure an active-passive communication mode can be used, so that the RF field is continuously generated by one of the valid parties. The recommendation is to maintain one of the NFC devices generating the RF field and actively listen to detect any disturbances caused by a potential attacker Secure Channel for NFC To protect against eavesdropping and data modification attacks the best solution is to establish a secure channel between the NFC devices. A standard key protocol such as Diffie-Hellman should be sufficient to implement it. As man in the middle attacks are not really a problem, the unauthenticated version of Diffie-Hellman is sufficient Use Tags Signed by Legitimate Entities The user should remember that NFC tags could be associated with malicious actions. Devices that emit these tags should be signing to ensure the user identity and avoid attacks, such as phishing or man in the middle. The importance of this action relies on the fact that a single tag can trigger various functions, such as using malicious code, making calls or modifying contacts. As with all new technology, a variety of security threats exists and should be dealt with in different ways. Digital signatures can offer one way of validating the originator of the tag content. A public key solution with some sort of public key infrastructure (PKI) and a standardised format for signature records on the tags can offer a flexible solution supporting signed tags from different providers. Furthermore, it is possible to process signatures and certificates on mobile devices and signature records can be added to NFC tags. The choice of signature algorithm will, however, influence the signature verification time and the amount of available space on the tag Cancel Automatic Actions Associated to Tags Currently, almost all NFC enabled mobile devices come with the NFC functionality already enabled. Thus, the device is ready for any NFC enabled device trying to connect and communicate with it. It may be better to disable the automatic function and allow the user to decide whether to download a tag or not. The user will then be aware of the services activated and be conscious of what it implies. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 12 / 22

16 4.9. Verification of Mobile Applications Applications using / accessing NFC functions should be verified by the entity making the distribution. The check should include best practices recommended by the OWASP and the applications including payment functions should follow the PCI DSS requirements Applications and Firmware Updates It is clear that software or firmware updates are designed to provide improvements over previous versions and enhance device performance. These updates may also resolve bugs or security leaks found in previous versions. Managed updates of different applications on mobile devices could therefore protect against different threats. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 13 / 22

17 5. Conclusions The NFC world is moving forward with new and exciting solutions for consumers. As with all new technologies, NFC offers new functionalities, but also brings with it new and unknown threats. A successful mobile payment world will be one that is developed by all stakeholders working together to create secure and efficient NFC services. Key actors from the industry including hardware manufacturers (mobile handsets, UICCs, NFC chips, etc), software and application providers (OS developers, application developers, etc), mobile network operators (MNOs) and the merchants will have to gather their energies to provide the end user with the appropriate path to a secure mobile world. The list below summarises the recommendations for secure NFC mobile payments: The business model is changing from issuer centric to user centric, meaning that the user will be the one choosing which applications to install where. Although the technology already enables this, the industry needs to ensure that business models allow the required level of security needed for highly sensitive applications such as mobile banking. MNOs and service providers need to follow best practices set out by standard associations to manage the critical data in the NFC application deployment (configuration, installation and management). Industry standards provide good guidelines for NFC mobile service deployment, but more case studies are needed to understand new trends. For example, the creation of the consumer centric business model will bring changes and create new roles and features. The OS developers will have to work together with mobile manufacturers to develop better ways of access control to avoid malware intrusion into the SE or the trusted execution environment (TEE). Wireless technology is always sensitive to sniffing and eavesdropping. NFC payments need to take this into account when sending the user s financial data wirelessly. Data encryption must be a requirement in this situation. Application developers always have to be concerned about security in their applications. The controlled access offered by the OS is a big plus to maintaining the critical financial data saved from mal-intentioned software. More authentication factors need to be developed beyond the usual PIN for mobile payments and banking applications. Hackers will figure out new ways of forcing payments if authentication is reduced to only one factor. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 14 / 22

18 6. Citations & References GlobalPlatform Messaging Specification for Mobile NFC Services v1.0.pdf GlobalPlatform Specifications in the UICC Configuration v1.0 Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks. Saar Drimer and Steven J. Murdoch Computer Laboratory. University of Cambridge Chip and PIN is Broken. IEEE Symposium on Security and Privacy, Eavesdropping Near Field Communication. Norwegian Information Security Conference, 2009 Henning Siitonen Kortvedt and Stig F. Mjølsnes Department of Telematics NTNU Practical Experiences with NFC security on Mobile phones. Gauthier Van Damme, Karel Wouters. Katholieke Universiteit Leuven, Belgium. The Evolution of RFID Security. Pervasive Computing IEEE. M.R. Rieback, B. Crispo, and A.S. Tanenbaum. IEEE, 5(1): 6269, Jan-March Chip and PIN is Broken. Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond. University of Cambridge, 2010 Security of Proximity Mobile Payments. Smart Card Allliance Mifare Classic analysis in Czech Republic / Slovakia. Mobile Devices Security on Practical Risks of NFC Payments. Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack at Chip and Skim: cloning EMV cards with the pre-play attack Issuer and Merchant Best Practices: Promoting Contactless Payments Usage and Acceptance. Smart Card Alliance Contactless Payments Security Questions & Answers Practical Experiences with NFC security on Mobile phones. Gauthier Van Damme, Karel Wouters. Katholieke Universiteit Leuven, Belgium. Security in Near Field Communication - NFC Strengths and Weaknesses. Ernst Haselsteiner and Klemens Breitfuß OWASP Mobile Security Project Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 15 / 22

19 Practical Attack Scenarios on Secure Element-Enabled Mobile Devices. M. Roland, J. Langer, and J. Scharinger. In Proceedings of the Fourth International Workshop on Near Field Communication (NFC 2012), Practical Attack Scenarios on Secure Element-enabled Mobile Devices. M. Roland, J. Langer, and J. Scharinger. In Proceedings of the Fourth International Workshop on Near Field Communication (NFC 2012), pp , Helsinki, Finland, Mar Public-Key-Based High-Speed Payment (electronic money) System Using Contactless Smart Cards. Yamamoto, H Lecture Notes in Computer Science, vol. 2140, pp Elliptic Curve Cryptography on Smart Cards Without Coprocessors. Woodbury, A. D., Bailey, D. V., and Paar, C Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp PIN Transaction Security (PTS) Point of Interaction (POI). PCI Security Standards Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 16 / 22

20 Appendices List of Appendices Appendix 1. Roles of Different Stakeholders within the NFC Ecosystem Appendix 2. Mobile Features Appendix 3. NFC Communication Protocols Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 17 / 22

21 Appendix 1. Roles of Different Stakeholders within the NFC Ecosystem The following appendix outlines the roles of major stakeholders within the NFC ecosystem considered relevant to the NFC security analysis presented in the paper. Term Application Developer (AD) Application Provider (AP) Controlling Authority (CA) Mobile Network Operator (MNO) Description The ADarchitects, designs, or builds an application code. This may include solution providers or merchants who modify or create software. The AP has a direct business relationship with the customers and holds the responsibility for the mobile NFC service management in the SE and mobile phone, but does not perform operational tasks. Operational tasks are delegated to the security domain manager. The AP procures the necessary components to load a complete application (i.e. application code, application data, application keys and / or certificates and data belonging to a specific cardholder) onto a card. The CA manages exchanges with an optional third party entity when required by the deployment model. The CA enforces the security policy in an environment with multiple stakeholders accessing the SE. Specifically, it may be used for secure security domain creation in an SE. A CA entity is mandatory when using confidential application loading and personalisation 10. The CA keys and the certificate are loaded into the CA secure domain by the card manufacturer during UICC manufacturing. The Confidential Setup of Initial Secure Channel Keys requires that the CA entity must be a trusted third party to the link platform operator (an entity operating an over the air (OTA) platform, i.e. the MNO or TSM) and the entity in charge of the application personalisation (i.e. either the trusted service manager or service provider). The CA may be a certificate authority or the SIM vendor itself 11. An MNO is the actual mobile network for mobile communications. An MNO maintains the mobile communication infrastructure and provisions wireless settings to mobile phones provided to consumers. It also determines both the required handset features and functions, and the service options to be provided with mobile phones sold through its channel. With UICC as a SE, an MNO also ensures the OTA connectivity between the consumer and the NFC application service provider. 10 Chapter 11 Confidential Setup of Initial Secure Channel Keys of the UICC Configuration 11 GlobalPlatform Specifications in the UICC Configuration v1.0 Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 18 / 22

22 Security Domain Manager (SDM) Secure Element Issuer (SEI) Trusted Service Manager (TSM) The SDM is responsible for a set of security domains in an SE. Depending on the privileges associated with its security domains, the SDM may have the capability to directly load, install, extradite or personalise applications on behalf of an application provider. If it does not have sufficient privileges or it does not have an OTA capability, it may request the help of another SDM to perform individual card content management operations or OTA dialogue. Also, the SDM may be responsible for the global SE and mobile device NFC service management operations on behalf of the application provider. In this case, the SDM may need the knowledge of the global SE and mobile NFC service breakdown structure. The SEI is the entity that sources the SE, controls the SE s secure domain keys, brands the SE and provides it to end users. The SEI can also open the SE to additional application issuers (AI). The SEIs can be an MNO, a financial institution, a transport authority, a customer loyalty scheme owner, or even the TSM, which provides this service to the service provider. Alternatively, an SEI can be an independent organisation which wishes to empower MFS and claim a position in the new and constantly developing MFS ecosystem. Some of the SEI s main responsibilities are to develop the card product profile, and to choose the appropriate platform and application technologies. The SEI creates an issuer security domain inside the SE. This issuer security domain is used to perform card management operations by the security domain manager 12. The TSM is the trusted party between service providers and NFC devices. The service providers can deliver NFC mobile devices with remote management functionality through the TSM. Depending on the deployment, the TSM may have the following key functionalities: Issuing and managing a TEE Assigning trusted areas within a TEE to a specific service Managing keys for a TEE Securely downloading applications to NFC mobile phones Personalising applications Locking, unlocking and deleting applications according to requests from a user or a service provider These functionalities can be performed by mobile network operators, service providers or third parties. All or part can be delegated by one party to another. Even though the TSM uses the word trusted in its name, this role is not necessarily associated with the key management functions. In most cases this entity will not be managing keys, neither for the MNO nor the service provider. Table 2. The Roles of Major Stakeholders within the NFC Ecosystem 12 GlobalPlatform Messaging Specification for Mobile NFC Services v1.0.pdf Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 19 / 22

23 Appendix 2. Mobile Features 1) Application Activation User Interface (AAUI) This is the element with which the user interacts to perform the application selection. There may be more than one AAUI on a mobile device, however only one is active at once. Whilst the payment applications are hosted on a SE, the location of the AAUI may vary. For example, the AAUI could be implemented as an application running in the application environment of the mobile device (for example, a Java MIDlet), or it could be implemented on a SE (for example, a UICC with the AAUI implemented as a smartcard web server (SCWS) application). The proximity payment system environment could be implemented on a SE, in the application environment of the mobile device, or even in the contactless module. 2) Application Execution Environment (AEE) Mobile device functionalities, such as voice calling, packet communication, phonebook, browser, mailer, and so on may be expanded to realise NFC mobile services, it also provides a user interface to execute phone services interactively. All these functionalities are used and expanded to realise NFC mobile services, and as a group are termed an application execution environment (AEE). An AEE supports data storage and processor capabilities, and executes mobile phone services in a relatively secure manner, but this level of security may not be sufficient to meet the needs of all NFC service providers. 3) Trusted Execution Environment (TEE) Some categories of NFC services, such as payment, require highly trusted environments, which are not necessarily realised by the AEE. A TEE executes security relevant NFC applications in a trusted and secure environment. The TEE can have various form factors, some of which can be removable (or replaceable), but the most important characteristic from an interactive services point of view is that the TEE has an interface to the AEE. A TEE provides secure data storage, secure management functionalities, a secure execution environment and so on. The secure management functionality is utilised to realise OTA downloading of applications and remote issuing or personalisation of NFC mobile services. Some of these functionalities may share parts with the AEE, but the TEE enhances security to satisfy the requirements for trusted NFC services. On the other hand, the TEE can disclose a specific interface to the AEE and give permission to access the TEE through the interface. For example, the mobile phone browser may access data stored in the TEE. An NFC mobile device may potentially have more than one TEE. There are various reasons to provide these, including user control, different service providers requiring separate TEEs for their applications, different levels of security policies, etc. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 20 / 22

24 Appendix 3. NFC Communication Protocols There are various protocols involved in each of the layers of the open systems interconnection model between the POS and the contactless card. The following table lists the communication protocols. Term Description ISO ISO14443A-NFC EMV An MNO is the actual mobile network for mobile communications. An MNO maintains the mobile communication infrastructure and provisions wireless settings to phones provided to consumers. It also determines both the required handset features and functions, and the service options to be provided with mobile phones sold through its channel. With UICC as a SE, an MNO also ensures the OTA connectivity between the consumer and the NFC application service provider. The protocol defined by specific ISO14443 RFID communication standard at a frequency of Mhz, defines two sub standards: A and B which differ from one another in the signal modulation methods. Variant A is commonly used in communications using NFC technology. EMV is a global standard for credit and debit payment cards based on chip card technology. EMVCo, owned by American Express, JCB, MasterCard, UnionPay and Visa, manages, maintains and enhances the EMV Integrated Circuit Card Specifications to ensure global interoperability of chip-based payment cards with acceptance devices including POS terminals and ATMs. There are three security modes some of which may operate offline and online: - Static data authentication (SDA): The card does not implement any kind of cryptography and simply authenticates using a certificate that can be verified by a CA. This mode of operation is vulnerable to replay attacks - Dynamic data authentication (DDA): The card implements RSA encryption and private key used to encrypt a cryptographic nonce produced by the POS. Advertise with the signed public key certificate for this to be verified by a CA. -Combined data authentication (CDA): The card implements RSA encryption and private key used to generate a cryptogram with various data from the POS. It publics the signed public key with the certificate for this can be verified by a CA. Table 3. NFC Communication Protocols It should be noted that none of the afore-described protocols have encryption implemented due to the following reasons: - ISO standard defines only the operations. - ISO14443A standard defines only the physical communication and security delegated to higher layers. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 21 / 22

25 - EMV was originally designed for communications in touch and measures were not implemented to encrypt communications. Copyright 2013 Mobey Forum A Security Analysis of the NFC Implementation 22 / 22

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015 Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

Risks of Offline Verify PIN on Contactless Cards

Risks of Offline Verify PIN on Contactless Cards Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nicholas Little, and Aad van Moorsel School of Computing Science, Newcastle University, Newcastle upon Tyne, UK {martin.emms,budi.arief,n.little,aad.vanmoorsel}@ncl.ac.uk

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world

Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken

More information

Relay attacks on card payment: vulnerabilities and defences

Relay attacks on card payment: vulnerabilities and defences Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin,

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org

More information

Significance of Tokenization in Promoting Cloud Based Secure Elements

Significance of Tokenization in Promoting Cloud Based Secure Elements Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,

More information

How Secure are Contactless Payment Systems?

How Secure are Contactless Payment Systems? SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Mobile Near-Field Communications (NFC) Payments

Mobile Near-Field Communications (NFC) Payments Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility

Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility 1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Mobile Payment Security discussion paper

Mobile Payment Security discussion paper Mobile Payment Security discussion paper Contents Executive summary 4 1. Introduction 5 2. introduction to security 6 2.1 Different types of security 6 2.2 Security objectives 7 2.3 Types of security measures

More information

Using EMV Cards to Protect E-commerce Transactions

Using EMV Cards to Protect E-commerce Transactions Using EMV Cards to Protect E-commerce Transactions Vorapranee Khu-Smith and Chris J. Mitchell Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {V.Khu-Smith,

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

Security of Proximity Mobile Payments

Security of Proximity Mobile Payments Security of Proximity Mobile Payments A Smart Card Alliance Contactless and Mobile Payments Council White Paper Publication Date: May 2009 Publication Number: CPMC-09001 Smart Card Alliance 191 Clarksville

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1. MasterCard M/Chip Mobile Solution

GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1. MasterCard M/Chip Mobile Solution INTRODUCING M/Chip Mobile SIMPLIFYING THE DEPLOYMENT OF SECURE ELEMENT MOBILE PAYMENTS OCTOBER 2015 GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1 Research into

More information

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations Bringing Security & Interoperability to Mobile Transactions Critical Considerations April 2012 Transactions 2 Table of Contents 1. Introduction... 3 2. Section 1: Facing up the challenges of a connected

More information

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015 Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment

More information

Android pay. Frequently asked questions

Android pay. Frequently asked questions Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

A Guide to EMV Version 1.0 May 2011

A Guide to EMV Version 1.0 May 2011 Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES... 4 1 INTRODUCTION... 5 1.1 Purpose... 5 1.2 References... 5 2 BACKGROUND... 6 2.1 What is EMV... 6 2.2 Why EMV... 7 3 THE HISTORY OF EMV... 8

More information

PCI and EMV Compliance Checkup

PCI and EMV Compliance Checkup PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations

More information

EMV Frequently Asked Questions for Merchants May, 2014

EMV Frequently Asked Questions for Merchants May, 2014 EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,

More information

Threat Modeling for offline NFC Payments

Threat Modeling for offline NFC Payments Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,

More information

EPC178-10 Version 2.0

EPC178-10 Version 2.0 EPC178-10 Version 2.0 MOBILE CONTACTLESS SEPA CARD PAYMENTS INTEROPERABILITY IMPLEMENTATION GUIDELINES Abstract This document provides guidance for the implementation of Mobile Contactless SEPA Card Payments

More information

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France Speaker's bio French computer security engineer working at

More information

Notes on Network Security - Introduction

Notes on Network Security - Introduction Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013 Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for

More information

Chip and PIN is Broken a view to card payment infrastructure and security

Chip and PIN is Broken a view to card payment infrastructure and security Date of Acceptance Grade Instructor Chip and PIN is Broken a view to card payment infrastructure and security Petri Aaltonen Helsinki 16.3.2011 Seminar Report Security Testing UNIVERSITY OF HELSINKI Department

More information

How To Protect A Smart Card From Being Hacked

How To Protect A Smart Card From Being Hacked Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response

More information

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names

More information

EMV : Frequently Asked Questions for Merchants

EMV : Frequently Asked Questions for Merchants EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

PCI Security Standards Council

PCI Security Standards Council PCI Security Standards Council Ralph Poore, Director, Emerging Standards 2013 About PCI Emerging Technologies OWASP and Mobile Guidelines About PCI About the PCI Council Open, global forum Founded 2006

More information

Visa Recommended Practices for EMV Chip Implementation in the U.S.

Visa Recommended Practices for EMV Chip Implementation in the U.S. CHIP ADVISORY #20, UPDATED JULY 11, 2012 Visa Recommended Practices for EMV Chip Implementation in the U.S. Summary As issuers, acquirers, merchants, processors and vendors plan and begin programs to adopt

More information

EMV mobile Point of Sale (mpos) Initial Considerations

EMV mobile Point of Sale (mpos) Initial Considerations EMV mobile Point of Sale EMV mobile Point of Sale (mpos) Initial Considerations Version 1.1 June 2014 2014 EMVCo, LLC ( EMVCo ). All rights reserved. Any and all uses of the EMV Specifications ( Materials

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

NFC technology user guide. Contactless payment by mobile

NFC technology user guide. Contactless payment by mobile Contactless payment by mobile Table of contents 1. What is contactless payment by mobile? 2. What do I need to shop with my mobile phone? 3. How can I manage a Mobile Card? 4. How do I shop with my mobile

More information

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD DELIVERS PEACE OF MIND PRODUCT FLYER ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD ENABLE FULL SUPPORT OF THE MOBILE PAYMENTS PROCESS FOR EMBEDDED

More information

Mitigating Fraud Risk Through Card Data Verification

Mitigating Fraud Risk Through Card Data Verification Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,

More information

The future of contactless mobile payment: with or without Secure Element?

The future of contactless mobile payment: with or without Secure Element? The future of contactless mobile payment: with or without Secure Element? By Sylvain Godbert, mobile payment and security expert at Nextendis By Jean-Philippe Amiel, director of Nextendis February, 2015

More information

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic

More information

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world

Chip & PIN is definitely broken v1.4. Credit Card skimming and PIN harvesting in an EMV world Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken

More information

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014

E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014 E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y February 2014 A G E N D A EMV Overview EMV Industry Announcements EMV Transaction Differences, What to Expect Solution

More information

Card Technology Choices for U.S. Issuers An EMV White Paper

Card Technology Choices for U.S. Issuers An EMV White Paper Card Technology Choices for U.S. Issuers An EMV White Paper This white paper is written with the aim of educating Issuers in the United States on the various technology choices that they have to consider

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

2015-11-02. Electronic Payments Part 1

2015-11-02. Electronic Payments Part 1 Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced

More information

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Serving millions of people worldwide with electronic payment convenience. Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Copyright 2011 Euronet Worldwide, Inc. All

More information

EMV: A to Z (Terms and Definitions)

EMV: A to Z (Terms and Definitions) EMV: A to Z (Terms and Definitions) First Data participates in many industry forums, including the EMV Migration Forum (EMF). The EMF is a cross-industry body focused on supporting an alignment of the

More information

MPIW Security Workgroup Initiative Progress to Date and Current Status

MPIW Security Workgroup Initiative Progress to Date and Current Status MPIW Security Workgroup Initiative Progress to Date and Current Status Susan Pandy, Federal Reserve Bank of Boston May 1, 2014 Susan Pandy is a Director in the Payments Strategies Group at the Federal

More information

Loyalty Systems over Near Field Communication (NFC)

Loyalty Systems over Near Field Communication (NFC) Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal diogo.simoes@tagus.ist.utl.pt Abstract.

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Frequently Asked Questions What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Issuers across the United States are beginning to embark in the planning and execution phase

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

C23: NFC Mobile Payment Ecosystem & Business Model. Jane Cloninger Director

C23: NFC Mobile Payment Ecosystem & Business Model. Jane Cloninger Director C23: NFC Mobile Payment Ecosystem & Business Model Jane Cloninger Director The mobile phone is the most successful communication device in history Global mobile subscribers (millions) 5,000 4,500 4,000

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

Chip & PIN notes on a dysfunctional security system

Chip & PIN notes on a dysfunctional security system Chip & PIN notes on a dysfunctional security system Saar Drimer http://www.cl.cam.ac.uk/~sd410/ Computer Laboratory in collaboration with Steven J. Murdoch, Ross Anderson, Mike Bond The Institution of

More information

EPC GSMA Mobile Contactless Payments Service Management Roles Requirements and Specifications. Doc: EPC 220-08, Version 2.

EPC GSMA Mobile Contactless Payments Service Management Roles Requirements and Specifications. Doc: EPC 220-08, Version 2. EPC GSMA Mobile Contactless Payments Service Management Roles Requirements and Specifications Doc: EPC 220-08, Version 2.0 October 2010 Contents EXECUTIVE SUMMARY 4 1 Introduction 5 1.1 Background 5 1.2

More information

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement !!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$

More information

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6 WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

American Express Contactless Payments

American Express Contactless Payments PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless

More information

Mobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4

Mobile MasterCard PayPass UI Application Requirements. February 2013 - Version 1.4 Mobile MasterCard PayPass UI Application Requirements February 2013 - Version 1.4 Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International

More information

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1

More information

HCE and SIM Secure Element:

HCE and SIM Secure Element: HCE and SIM Secure Element: It s not black and white A Discussion Paper from Consult Hyperion Supported by: Date: June 2014 Authors: Steve Pannifer, Dick Clark, Dave Birch steve.pannifer@chyp.com Consult

More information

mobile payment acceptance Solutions Visa security best practices version 3.0

mobile payment acceptance Solutions Visa security best practices version 3.0 mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

Mobile Application Security Sharing Session May 2013

Mobile Application Security Sharing Session May 2013 Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers

More information

Near Field Communication in Cell Phones

Near Field Communication in Cell Phones Near Field Communication in Cell Phones Annika Paus 24.07.2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 Standards

More information

NFC technology user guide. Contactless payment by mobile

NFC technology user guide. Contactless payment by mobile Contactless payment by mobile Table of contents 1. What is contactless payment by mobile? 2. What do I need to shop with my mobile phone? 3. How can I manage a Mobile Card? 4. How do I shop with my mobile

More information

How will Security Testing help to reduce risks and build customer confidence in mobile payments

How will Security Testing help to reduce risks and build customer confidence in mobile payments Whitepaper How will Security Testing help to reduce risks and build customer confidence in mobile payments sqs.com An insight to successful strategies beating the challenges of complex systems Introduction

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

Introductions 1 min 4

Introductions 1 min 4 1 2 1 Minute 3 Introductions 1 min 4 5 2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6 Randy - EMV History / Chip Cards /Terminals 5 Minutes

More information

Elevation of Mobile Security Risks in the Enterprise Threat Landscape

Elevation of Mobile Security Risks in the Enterprise Threat Landscape March 2014, HAPPIEST MINDS TECHNOLOGIES Elevation of Mobile Security Risks in the Enterprise Threat Landscape Author Khaleel Syed 1 Copyright Information This document is an exclusive property of Happiest

More information

How To Secure A Paypass Card From Being Hacked By A Hacker

How To Secure A Paypass Card From Being Hacked By A Hacker PayPass Vulnerabilities Balázs Bucsay http://rycon.hu - earthquake_at_rycon_dot_hu PR-Audit Kft. http://www.praudit.hu/ PayPass PayPass lets you make everyday purchases without having to swipe the magnetic

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

NFC Application Mobile Payments

NFC Application Mobile Payments NFC Application Mobile Payments Public MobileKnowledge June 2014 Agenda Introduction to payments Card based payments Mobile based payments NFC based payments mpos solutions NXP Product portfolio Successful

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 Fundamentals of EMV Guy Berg Senior Managing Consultant MasterCard Advisors guy_berg@mastercard.com 914.325.8111 EMV Fundamentals Transaction Processing Comparison Magnetic Stripe vs. EMV Transaction Security

More information

ETSI TR 102 071 V1.2.1 (2002-10)

ETSI TR 102 071 V1.2.1 (2002-10) TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security

Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security www.thales-esecurity.com Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security 2 / Verizon Data Breach Report 3 / Victim Industry

More information

Payments Transformation - EMV comes to the US

Payments Transformation - EMV comes to the US Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent

More information