Secure Smart Objects: Issues and Research trends
|
|
|
- Brendan Cunningham
- 10 years ago
- Views:
Transcription
1 Secure Smart Objects: Issues and Research trends Samia Bouzefrane SEMpIA team CEDRIC Lab March 19th,
2 Agenda What is SSO? Characteristics of the platforms Security issues Actions to promote SSO domain 2
3 Context 3
4 Secure Devices Smart cards exist since 1979/1980 Research work for 30 years Evolution from contact to contactless devices New technologies : wireless networks, RFID Needs in terms of Security leading to trust systems [email protected] 4
5 Characteristics Light-weight resources Memory Computation Energy Strong security constraints 5
6 Properties Communicating Objects Interaction with remote resources Secure Objects Secure interaction with the environment Interface Objects To access services Trust Objects The user trusts these objects Domestic Objects Human-CenteredDesign 6
7 Hard/Soft Platforms Smart cards (contact/contactless) Crypto-keys RFID sensors NFC chips TPM (Trusted Platform Module) TEE (Trusted Execution Environment) Mobile Trusted Modules for Mobile phones etc. 7
8 Research communities Smart Cards RFID/ Sensor Security and Privacy Trusted computing Internet of things 8
9 Smart cards as secure devices 9
10 According to eurosmart Source Eurosmart: 10
11 Evolution of smart cards Inventor: Roland Moreno ( ), 47 patents in 11 countries Involvement of industrials like Bull and Schlumberger Used in many domains: transport, telecom, banking, check access, passport From mono-application to multi-application From proprietary OS to open OS (Java Card,.NET) 11
12 ISO7816 Standard The standard ISO defines the physical characteristics of the card The standard ISO defines theposition ofthecontacts within the card The standard ISO defines theelectricsignalsusedto communicate with the card The standard ISO defines the basic commands to interact with the smart cards 12
13 Card Contacts in ISO APDU protocol for communication 13
14 Card life cycle 14
15 Physical characteristics Monolithic component : CPU (8, 16, 32 bits) PROM (32 to 64 KB) containsos (JVM) RAM (1 to 4 KB) EEPROM/Flash 1KB to 128 KB (256 KB for Java Card) contains data and applications I/O interface crypto processor [email protected] 15
16 Physical security Sensors to detect: a loss of electrical power, overheating of the components, light sensor. [email protected] 16
17 A safety box Stores security keys and sensitive data Implements cryptographic algorithms Crypto-processor Used for authentication and encryption SIM card authentication with the cell networks Banking card authentication with payment terminals 17
18 Security protocols 18
19 Standards ISO 7816 (basic standard) ETSI (for SIM/USIM cards) EMV (Europay Mastercard Visa, for banking cards) ICAO (International Civil Aviation Organization, ONU agency, for biometry, passport) Health 19
20 SIM card Authentication with GSM SIM card Mobile Base Station VLR HLR/AuC LAI, TMSI Identity request IMSI Authentication request RAND Triplet(RAND, SRES, Kc) Kc=A8(Ki,RAND) SRES =A3(Ki,RAND) Aknowledgment A5(Kc, TMSI) SRES =SRES? Switch to encrypted mode Aknowledgment ETSI Standard 20
21 SIM card architecture 21
22 SIM card services Data Storage For network configuration (IMSI, lang. pref. ) For the user (agenda, SMS file, MSISDN) Dynamic information: session key (Kc), geolocalization (LAI, TMSI) Service Storage Applications Remote updates Proactive behaviour [email protected] 22
23 APDU communication Mobile SIM 23
24 Pro-active mode Mobile SIM 24
25 Post-issuance Post-personalization = post-issuance [email protected] 25
26 Over The Air management 3GPP TS Standard (ETSI) SMS of type SIM Data Download Security mechanisms Authentication: DES signature (Hash message) added to the message Confidentiality: DES encryption of messages Integrity: add a checksum to the message Againtsreplay: add a seqno for each message [email protected] 26
27 EMV payment Personalization with DDA Bank AuC Infos (C priv, C pub ) Sig Epriv (C pub ) (E pub, E priv ) Sig CApriv (E pub ) Certificat (C cert ) Certificat (E cert ) Banking card (Infos, C priv, C pub, C cert, E pub, E cert ) Transactions CA pub [email protected] 27 Merchant
28 Dynamic Data Authentication C cert = Sig Epriv (C pub ) E cert = Sig CApriv (E pub ) (Infos, C cert, E cert ) T alea (Infos, C cert, E cert ) (Infos,C pub, C priv, C cert, E pub, E cert ) PIN code Res=Sig Cpriv (C alea, T alea ), C alea RSA(E cert, CA pub )=E pub CA pub RSA(C cert, E pub )=C pub Decrypt(Res, C pub )?= C alea, T alea Askto PIN code Banking card Crypt Cpub (PIN code, alea1, alea2) Merchant [email protected] 28
29 Personalisationfor payment Bank Infos E master C master Card C master [email protected] 29
30 Off line payment Derivation of a unique key for each transaction: C master ATC C trans 3DES(Trans, C trans, ATC) Card Merchant [email protected] 30
31 On line payment C master C trans ARQC C trans (Trans, ARPC) ARPC Card Merchant Bank [email protected] 31
32 Trusted Execution Environment 32
33 Industrydevelopment The pioneers ( ): first foundation : the technology is improved Markets and large deployments: CB, GSM Limits: need more flexibility : explosion of the market, cards based on Scalable Java Card 2013: 90% SIM cards are Java Card platforms With5 billions in ???: the card becomes an element of the network SCWS (Smart CardWeb Server),.Net, Java Card3.0 [email protected] 33
34 Java Card technology 34
35 Java Card Specification Java Card 3 Specification by Oracle Classic edition (extension of Java Card 2.2) Java Card API Specification Java Card Runtime Environment Specification Java Card Virtual Machine Specification Connected edition (Web oriented, not deployed) Java Card forum promotes Java Card Tech. Global Platform defines a trust environment in a multi-application cards (as for Java Card) [email protected] 35
36 Java Card platform 36
37 Development process Off-Card CAP file On-Card 37
38 Global Platform standard CAP file signed before conversion Checks the integrity of the installed applications Checks if the CAP file is signed Secure communication from the terminal Package authentication before applet installing Secure channels 38
39 GlobalPlatformCardSpecification v2.2.1 Controlling Authorities' Security Domain(s) Global Services Application(s) Application Providers' Security Domain(s) Issuer's Security Domain Application Provider Application(s) Card Issuer Application(s) GP API RTE API OPEN and GP Trusted Framework Runtime Environment 39
40 GP RunTimeEnvironment RTE dedicated to multi-applications card Provides to the applications A secure execution environment The code/data of applications are isolated from each other In Java Card, this is achieved thanks to the firewall applet [email protected] 40
41 Security domains in Java Card In Java Card platforms Each application (package) in a Security Domain Many applications from distinct providers may co-exist in the same card A firewall applet checks the isolation Each application has its own trusted execution environment The applications may share objects [email protected] 41
42 Attacks 42
43 Motivation Objective Find/modify confidential information Benefits Make a financial order, impersonation, invasion of privacy [email protected] 43
44 Physical attacks Inspection of the circuit using the microscope (examples of results Observation Measure the response time of a query, measure the current consumption or electromagnetic circuit Micro-probing (to examine the data exchange of a bus) Disruption Change the clock rate (which is external) Vary the voltage Generate a strong magnetic field Light the silicon using a laser or a camera [email protected] 44
45 Logical attacks Attacks taking advantage of bugs in the implementation of the JCVM. Weakness in the bytecode verifier Injection of code Laser attack to modify data values 45
46 Towards the contactless 46
47 RFID Radio Frequency Identification Identification of persons, objects, services Contactless technology: transmission by radio 47
48 RFID components RFID architecture: -base station: a reader, aterminal, cell phone, etc. that identifies and processes the information read by radio waves A transponder or "tag" : electronic label, contactless card. A system: web service, information systems, middleware processes the data for analysis, archiving, traceability. [email protected] 48
49 RFID system architecture Radio Signal LAN, Web tag UID reader data 49
50 Tag components 50
51 RFID Tags/Frequencies Tags Memory/Microprocessortags Passive/Active Frequencies LowfrequencyLF (<= 135KHz) High frequencey HF (around MHz) Ultra-highfrequencyUHF (~ 434 MHz, MHz, 2.45 GHz) Micro-waves(~ 2.45 GHz) 51
52 ISO standards ISO (Part 1 to 4) Part 1 : contacless integrated circuit cards: physical characteristics Part 2: contacless integrated circuit cards: radio frequency power and signal inteface Part 3: contacless integrated circuit cards: initialization and anticollision Part 4: contacless integrated circuit cards: transmission protocol ISO Standards for contactless Distance : 10 cm rate: some hundreds of kilobits/s [email protected] 52
53 ISO Standards ISO (1 to 4) : contaclessintegratedcircuit cards Part 1: Physical characteristics Part 2: Dimension and location of coupling areas Part 3: Electronic signals and reset procedures Part 4: Answer to reset and transmission protocols. ISO Distance : 10 mm [email protected] 53
54 ISO Standards ISO (1 to 3) : contaclessintegratedcircuit cards Part 1 : vicinity cards: physical characteristics Part 2: vicinity cards: air interface and initialization Part 3: vicinitycards: anti-collision andtransmission protocol ISO Distance : 1m [email protected] 54
55 Electronic passport According to ICAO DOC 9303 standard The electronic passport is a passive tag compatible with ISO/IEC standard has a cryptoprocessor(rsa-1024, elliptic curves) EEPROM: 30KB to 70KB [email protected] 55
56 Security problems Basic tags used for identification with no authentication Resolvedon theserver: as in EPCglobal Centralizedsolution: implementationofcryptographicalsolutions for tags with resource capabilities(like smart cards) Privacy - Ex: biometric passeport includes an authentication mechanism (faraday cup) Geo-localization of objects Standardization in the field: too many different solutions Respect of the environnement: Biodegradable tags [email protected] 56
57 NearField Communication 57
58 NFC over the world Japan with Sony FeliCa, NTT DoCoMo Cingular Wireless, Citigroup, New York subway, MasterCard Worldwide, Nokia, Venyon StoLPaN «Store Logistics and Payment with NFC» is a european consortium : Touch&Travel: Vodafone, Deutsche Bahn, Motorola, Giesecke&Devrient, ATRON electronic, Germany Manchester City Football Club, Orange, Barclays, TfL Oyster card Transportation in London, smart poster Cityzi at Nice, mobile payment at Caen and Strasbourg. [email protected] 58
59 NFC modes 59
60 NFC Forum specifications/1 NFC Forum gathersa greatnumberofindustry: Samsung, Sony, Nokia, Nec, Panasonic, Visa Goal of standardization of RFID market like EPCglobal Modular architecture and interoperable targets the mobile market. Frequency 13.56MHz (HF) Rate of424 Kb/s Standardizedby ISO ISO l ECMA (European Computer Manufacturer Association) ECMA 340 NFC IP-1 ECMA 352 NFC IP-2+ Compatible ISO A, Felica(Sony), Mifare(Philips) [email protected] 60
61 NFC Forum specifications/2 NFC allows a phone to read / write a tag, to act as a smart card or to communicate with another phone. 3 modes : Read/write of tags (MIFARE ) Peerto peer(initiator& target) Card emulation Distance : 0-20 cm Rate: 424 kbits/s NFC Forum : NDEF specs [email protected] 61
62 Other standards / SCP (Smart Card Platform) to specify the interface between the SIM card and the chip NFC. to specify the multiapplication architecture of the secure element. for the impact on the EMV payment applications. [email protected] 62
63 NFC Forum specifications Peer to peer mode Read/Write mode Card emulation mode Applications LLCP (Logical Link Control Protocol) RTD (Record Type Definition) & NDEF (Data Exchange Format) Card Emulation (Smart Card Capability for Mobile Devices) RF Layer ISO ISO Type A, Type B + FeliCa [email protected] 63
64 Mobile Payment Applications Java Blackberry OTA Single WireProtocol(SWP) : thesim cardislinked to thesecureelement(se) building a samejava Card. GlobalPlatform is used for isolation & security. OS CPU UICC SIM Apps OS NFC Chip NFC antenna External env. [email protected] 64
65 Threats Denial of service by using a jammer to disrupt the communications Identity Theft: Solution: use a challenge-response protocol instead of a simple identification protocol Data recovery: data leakage, traceability, etc. Relay attacks: Solution distance bounding protocol that evaluates the distance by measuring the time elapsed [email protected] 65
66 Trusted Platform Module 66
67 Trusted Platform Module Manufacturers: HP, Infineon, Intel Dell, FUJITSU, etc. Sensors: Over/Under voltage detection, low frequency sensor, high frequency filter, reset filter More than500 millions ofpcswithtpms M+-+TPM+Chip+can+be+turned+off+Entirely 67
68 Trusted Computing Group Called Trusted Computing Platform Alliance until 2003 Consortium of companies: Compaq, HP, IBM, Intel, Microsoft, AMD, etc. Designed a specification for computing platforms that creates a foundation of trust for software processes, based on a small amount of hardware within such platforms. The cheapest way to enhance security in an ordinary, nonsecure computing platform. PCs, servers, personal digital assistant (PDA), printer, or mobile phone can be converted to Trusted Platforms. [email protected] 68
69 First trusted platforms : PCs to store secret keys to encrypt data files/messages, to sign data, etc. implement mechanisms and protocols to ensure that a platform has loaded its software properly. Have their own hardware and are independent from the operating system of the PC. [email protected] 69
70 TPMsof Microsoft for PCs, Tablets Encryption of data files: Windows EFS (Encrypting File System), Virtual Encrypted Drive (Personal Secure Drive) Electronic mails withoutlook, Outlook Express that take into account digital signature, encryption/decryption of s. VPN (Virtual Private Network), client authentication 70
71 Benefits Existing applications may benefit from enhanced security of the platforms Development of new applications that require higher security levels New applications: electronic cash, , single sign-on, virtual private networks, Web access, and digital content delivery. 71
72 Trusted Platform Subsystem TPM: chip CRTM: boot process TSS: services for the platform and others 72
73 Attestation Identity to prove TP authenticity Identity created by the TP Identity Attestation from the CA 73
74 TPM protected objects 74
75 Trusted Platform Module "TPM chip" or "TPM Security Device" 75
76 Issues Privacy issue: security is delegated to the TPM, the user has no control on his data Each object is signed (what about the free software?) The TPM is a trust root that needs to interact with trust Cloud if any. [email protected] 76
77 Mobile Trusted Module Mobile Phone Work Group has proposed a MTM Generally not implemented in mobile platforms Software trusted domains are proposed As security domains of Global Platform Attestation techniques to verify the integrity of the mobile [email protected] 77
78 Our activities What is a Cloud of trust? How to define a trust mobile using a piece of software and the SIM card instead of MTM? How to build a trust environment including mobile platforms and a cloud (mobicloud computing)? How to manage privayin this context? [email protected] 78
79 References ETSI Standard: EMV Standard: Trusted Computing Platforms, the Next Security Solution, Lecture notes of SamiaBouzefrane NFC forum: Java Card forum: Global Platform: Oracle: TCG: 79
80 Actions to promote SSO 80
81 CommunautéSSO Àl échelle nationale: créer une action CNRS A l échelle internationale: Un workshop international co-localiséavec IEEE ithings 2013 [email protected] 81
82 Action CNRS SSO 82
83 GDR ASR PôleArchitectures Embarquées dirigépar Claire Pagetti(ONERA) et Pierre Boulet(Université de Lille 1, LIFL) PôleSystèmes dirigépar Jean-Marc Menaud(Ecoledes Mines de Nantes) et Jean-Louis Pazat(IRISA) PôleRéseauxde Communication dirigépar Eric Fleury(ENS Lyon) et André-Luc Beylot(IRIT/ENSEEIHT) Action Cloud Computing dirigée par Pierre Sens(LIP6) et Samir Tata(Institut Mines Telecom) Action Secure Smart Objects dirigéepar SamiaBouzefrane (CNAM) et MarylineLaurent (InstitutMines Telecom) 83
84 Action CNRS SSO Objectifs regrouper la communautéfrançaise travaillant sur cette thématique renforcer et faire connaître ses activités organiser des événements scientifiques comme des Conférences, des Écoles d été, etc. impliquer les entreprises [email protected] 84
85 JournéeNFC/SSO le 29 Mars Lien: Organisateurs: S. Bouzefrane & P. Paradinas(CNAM) M. Laurent (Télécom SudParis) P. Métivier(Forum des Services mobiles sans contact) Programme Matindédiéau NFC: 4 intervenants(forum dusans contact, Inside Secure, Orange Labs, Visa Europe) Après-midi dédié au SSO: Présentations par les entreprises et les universités [email protected] 85
86 International Workshop on SSO 86
87 International Workshop SSO Lien: Workshop international sursso Associé à la Conférence IEEE ithings Août2013 àbeijing Organisateurs: S. Bouzefrane (CNAM), Jean-Louis Lanet(univ. Limoges), M. Laurent (Telecom SudParis), Li Li (Wuhan univ.) 87
88 TraitésHermès 88
89 TraitéHermès Carte àpuce Initiéet coordonnépar S. Bouzefrane & P. Paradinas Dédiéàla carte àpuce 12 chapitres 24 participants Parutionen Avril
90 TraitéHermès gestiond identités numériques Initiéet coordonnépar S. Bouzefrane & M. Laurent Différents aspects de la gestion d identités Ouverture vers le Cloud computing Parutionen fin 2013 [email protected] 90
91 Thank you gfrdsdrfg 91
Mobile Cloud Computing
Mobile Cloud Computing Dr Samia Bouzefrane Laboratoire CEDRIC CNAM, 292 rue Saint Martin http://cedric.cnam.fr/~bouzefra [email protected] 1 Agenda Mobile Cloud computing Mobile trusted computing
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Smart Cards a(s) Safety Critical Systems
Smart Cards a(s) Safety Critical Systems Gemplus Labs Pierre.Paradinas [email protected] Agenda Smart Card Technologies Java Card TM Smart Card a specific domain Card Life cycle Our Technical and Business
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
Smart Card Technology Capabilities
Smart Card Technology Capabilities Won J. Jun Giesecke & Devrient (G&D) July 8, 2003 Smart Card Technology Capabilities 1 Table of Contents Smart Card Basics Current Technology Requirements and Standards
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Chytré karty opět o rok dál...
Chytré karty opět o rok dál... SmartCardForum 2010 Jan Němec Product expert, Gemalto Květen 2010 Agenda Chytré karty včera, dnes a zítra Úvod do problematiky NFC Integrace NFC do mobilních zařízení Java
NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.
Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
NFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal. Abstract
3GPP TSG SA WG3 Security S3#30 S3-030534 6-10 October 2003 Povoa de Varzim, Portugal Source: Gemplus, Oberthur, Schlumberger Title: Over-The-Air (OTA) technology Document for: Discussion and decision Agenda
Java Card. Smartcards. Demos. . p.1/30
. p.1/30 Java Card Smartcards Java Card Demos Smart Cards. p.2/30 . p.3/30 Smartcards Credit-card size piece of plastic with embedded chip, for storing & processing data Standard applications bank cards
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
Bringing MNOs an end to end Mobile Connect Solution. Mobile Connect for Mobile Network Operator
Bringing MNOs an end to end Mobile Connect Solution Mobile Connect for Mobile Network Operator 1 What is Mobile Connect for MNO? 2 Unmatched end to end solution 1. Complete authenticator out of the box
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
advant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke [email protected] Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
Mobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
Using an NFC-equipped mobile phone as a token in physical access control
University of Twente Faculty of electrical engineering, mathematics and computer science Nedap Securiy Management Using an NFC-equipped mobile phone as a token in physical access control Author: Martijn
Smart Card Evolution
Smart Card Evolution Fernando Ferreira Departamento de Informática, Universidade do Minho 4710-057 Braga, Portugal [email protected] Abstract. This comunnication describes the state of
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
Smartcard Web Server Enabler Architecture
Smartcard Web Server Enabler Architecture Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-AD-Smartcard_Web_Server-V1_0-20070209-C OMA-AD-Smartcard_Web_Server-V1_0-20070209-C Page 2 (17) Use
T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: 2004-07-16 Version 1.0
T-BOXN12R You can make it wireless First steps with T-BOXN12R Date: 2004-07-16 Version 1.0 Content 1. Purpose of this document... 3 2. T-BoxN12R overview... 4 3. First step... 5 3.1. Preparing your workshop
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Common requirements and recommendations on interoperable media and multi-application management
Common requirements and recommendations on interoperable media and multi-application management Deliverable 3.2 September 2009 Grant Agreement number: IST-2007-214787 Project acronym: IFM PROJECT Project
The mobile phone as a contactless ticket
The mobile phone as a contactless ticket Magnus Egeberg Master of Science in Communication Technology Submission date: June 2006 Supervisor: Van Thanh Do, ITEM Co-supervisor: Juan Carlos Lopez Calvet,
How To Protect A Smart Card From Being Hacked
Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response
How To Secure A Paypass Card From Being Hacked By A Hacker
PayPass Vulnerabilities Balázs Bucsay http://rycon.hu - earthquake_at_rycon_dot_hu PR-Audit Kft. http://www.praudit.hu/ PayPass PayPass lets you make everyday purchases without having to swipe the magnetic
Java Card TM Open Platform for Smart Cards
Java Card TM Open Platform for Smart Cards Wolfgang Effing Giesecke & Devrient GmbH C:\Presentations - JavaCard_OpenPlatform.ppt - ef - 29.04.04 - page 1 What happened in the past? Every company created
Smart Card. Smart Card applications
Smart Card Chip Plastic card A very secure way of storing a small amount of sensitive data 1 Smart Card applications Retail Sale of goods using Electronic Purses, Credit / Debit Vending machines Loyalty
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
NFC Testing. Near Field Communication Research Lab Hagenberg. Gerald Madlmayr. NFC Research Lab, Hagenberg. E-Smart 2008, Sophia Antipolis
NFC Testing Gerald Madlmayr NFC, E-Smart 2008, Sophia Antipolis 1 NFC Research Topics Software: Contactless Applications and Infrastructure Hardware: Testing & Interoperability Security Usability Founded
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT [email protected] Hackito Ergo Sum 2012 April 12,13,14 Paris, France
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT [email protected] Hackito Ergo Sum 2012 April 12,13,14 Paris, France Speaker's bio French computer security engineer working at
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel
Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel [email protected] 1,2 Information Technology Department, 1,2 Gujarat Technological University, Gujarat, India. Abstract: Sun Microsystems
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
Supporting Smart Cards in UEFI
presented by Supporting Smart Cards in UEFI UEFI PlugFest March 18-22, 2013 Presented by Jean Lusetti (Gemalto) Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Who is Gemalto?
The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris
The OpenEapSmartcard platform Pr Pascal Urien ENST Paris /20 Pascal URIEN, CARTES 2005, November 16 th 2005 Introduction 1/4: Network ages Analog networks (Tree age) 1876, Alexander Graham Bell invents
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
How To Understand And Understand The Mobile Nfc Ecosystem
NFC services mobile Version 1.0 February 2007 Disclaimer and Legal Notices Every care has been taken in the preparation of this report to ensure that the information provided is accurate, factual and correct
NFC Mobile Handset High Level Requirements V2
NFC Mobile Handset High Level Requirements V2 Release 2.0 Date : 28/09/2011 Reference: 110928 - AFSCM TECH - LIVBL - NFC Mobile Handset High Level Requirements - v2.0.doc AFSCM NFC Mobile Handset High
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
Business through Mobile Phone initiated Near Field Communication
Business through Mobile Phone initiated Near Field Communication Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331 Fornebu [email protected], [email protected] 1 from 1.6.2005 Prof. stip.
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! New site live: blackwinghq.com! We re always
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
a leap ahead in analog
EMV Contactless Payment Systems based on AS3911 Overview and System Simulations Giuliano Manzi, PhD Mannheim, May 23 25, 2012 CST EUROPEAN USER CONFERENCE 2012 a leap ahead in analog OUTLINE AS3911 OVERVIEW
Threat Modeling for offline NFC Payments
Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Using ISO 15693 Compliant RFID Tags in an Inventory Control System
Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London
Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London Damien Sauveron [email protected] http://damien.sauveron.free.fr/ GT SeFSI 3 octobre 2006 Le Campus du Royal
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015
Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular
Java Card Protection Profile Open Configuration
Java Card Protection Profile Open Configuration May 2012 Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 Java Card Protection Profile Open Configuration 1 Java Card
NFC Application Mobile Payments
NFC Application Mobile Payments Public MobileKnowledge June 2014 Agenda Introduction to payments Card based payments Mobile based payments NFC based payments mpos solutions NXP Product portfolio Successful
Secure Automatic Ticketing System
Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA [email protected]
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
How Secure is Authentication?
U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited
Mobile NFC 101 Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited Company Lateral Security (IT) Services Limited Company Overview Founded in April 2008
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
GlobalPlatform. Card Specification. Version 2.2
GlobalPlatform Card Specification Version 2.2 March 2006 Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights or other intellectual property
Risks of Offline Verify PIN on Contactless Cards
Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nicholas Little, and Aad van Moorsel School of Computing Science, Newcastle University, Newcastle upon Tyne, UK {martin.emms,budi.arief,n.little,aad.vanmoorsel}@ncl.ac.uk
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
The Future is Contactless
Contactless Implementation and Benefits The Future is Contactless One of the most exciting new applications to be launched in the payment world is contactless payment. The technology is already available
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan 1 Near Field
A Guide to EMV Version 1.0 May 2011
Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES... 4 1 INTRODUCTION... 5 1.1 Purpose... 5 1.2 References... 5 2 BACKGROUND... 6 2.1 What is EMV... 6 2.2 Why EMV... 7 3 THE HISTORY OF EMV... 8
Mobile Device Management
Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national
EMV: A to Z (Terms and Definitions)
EMV: A to Z (Terms and Definitions) First Data participates in many industry forums, including the EMV Migration Forum (EMF). The EMF is a cross-industry body focused on supporting an alignment of the
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013
An Open Source eid Simulator Open Identity Summit 9th -11th September 2013 BSI Tobias Senger HJP Consulting Holger Funke Agenda Requirements of BSI Current state Simulator Virtual Smart Card Reader Community
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Bank. CA$H 2.0 Contactless payment cards
Bank CA$H 2.0 Contactless payment cards You can call it 'cash 2.0': a new age of wireless payment technology that may replace even the smallest cash transactions in the coming years with the wave of a
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
