Relay Attacks in EMV Contactless Cards with Android OTS Devices
|
|
|
- Arleen Sherman
- 10 years ago
- Views:
Transcription
1 Relay Attacks in EMV Contactless Cards with Android OTS Devices José Vila, Ricardo J. Rodríguez All wrongs reversed Computer Science and Research Institute of Systems Engineering Dept. Applied Sciences in Cybersecurity University of Zaragoza, Spain University of León, Spain May 28, 2015 Hack in the Box 2015 Amsterdam (Nederland)
2 About us Pepe Vila Security Consultant at E&Y Dr. Ricardo J. Rodríguez Senior Security Researcher at ULE Main research interests </JavaXSScript>and client-side attacks NFC security Android internals Main research interests Security/safety modelling and analysis of ICS Advanced malware analysis NFC security J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 2 / 36
3 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 3 / 36
4 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 4 / 36
5 Introduction to NFC (I) What is NFC? Bidirectional short-range contactless communication technology Up to 10 cm Based on RFID standards, works in the MHz spectrum Data transfer rates vary: 106, 216, and 424 kbps J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 5 / 36
6 Introduction to NFC (I) What is NFC? Bidirectional short-range contactless communication technology Up to 10 cm Based on RFID standards, works in the MHz spectrum Data transfer rates vary: 106, 216, and 424 kbps Security based on proximity concern: physical constraints J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 5 / 36
7 Introduction to NFC (II) Wow! NFC sounds pretty hipster! Two main elements: Proximity Coupling Device (PCD, also NFC-capable device) Proximity Integrated Circuit Cards (PICC, also NFC tags) Three operation modes: Peer to peer: direct communication between parties Read/write: communication with a NFC tag Card-emulation: an NFC device behaves as a tag J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 6 / 36
8 Introduction to NFC (III) ISO/IEC standard Four-part international standard for contactless smartcards 1 Size, physical characteristics, etc. 2 RF power and signalling schemes (Type A & B) Half-duplex, 106 kbps rate 3 Initialization + anticollision protocol 4 Data transmission protocol IsoDep cards: compliant with the four parts Example: contactless payment cards J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 7 / 36
9 Introduction to NFC (IV) ISO/IEC 7816 Fifteen-part international standard related to contacted integrated circuit cards, especially smartcards Application Protocol Data Units (APDUs) J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 8 / 36
10 Introduction to NFC (V) [Taken from MHz RFID Proximity Antennas ( J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 9 / 36
11 Introduction to NFC (V) [Taken from MHz RFID Proximity Antennas ( J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 9 / 36
12 Introduction to NFC (VI) J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 10 / 36
13 Introduction to NFC (VII) Ok... So, is it secure, right? Right?? J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 11 / 36
14 Introduction to NFC (VII) Ok... So, is it secure, right? Right?? If it were *so* secure, you would not be staring at us J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 11 / 36
15 Introduction to NFC (VII) Ok... So, is it secure, right? Right?? If it were *so* secure, you would not be staring at us NFC security threats Eavesdropping Secure communication as solution Data modification (i.e., alteration, insertion, or destruction) Relays Feasible in theory (but requires quite advanced RF knowledge) Forwarding of wireless communication Two types: passive (just forwards), or active (forwards and alters the data) J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 11 / 36
16 Introduction to NFC (VII) Ok... So, is it secure, right? Right?? If it were *so* secure, you would not be staring at us NFC security threats Eavesdropping Secure communication as solution Data modification (i.e., alteration, insertion, or destruction) Relays Feasible in theory (but requires quite advanced RF knowledge) Forwarding of wireless communication Two types: passive (just forwards), or active (forwards and alters the data) We focus on passive relay attacks J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 11 / 36
17 Introduction to NFC (VIII) NFC brings cards to mobile devices Payment sector is quite interested in this new way for making payments 500M NFC payment users expected by 2019 Almost 300 smart phones available at the moment with NFC capabilities Check http: // Most of them runs Android OS J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 12 / 36
18 Introduction to NFC (VIII) Research Hypothesis NFC brings cards to mobile devices Payment sector is quite interested in this new way for making payments 500M NFC payment users expected by 2019 Almost 300 smart phones available at the moment with NFC capabilities Check http: // Most of them runs Android OS Can a passive relay attack be performed in contactless payment cards, using an Android NFC-capable device? If so, what are the constraints? (whether any exists) J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 12 / 36
19 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 13 / 36
20 Background (I) EMV contactless cards Europay, Mastercard, and VISA standard for inter-operation of IC cards, Point-of-Sale terminals and automated teller machines Authenticating credit and debit card transactions Commands defined in ISO/IEC and ISO/IEC ( Application ID (AID) command J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 14 / 36
21 Background (II) MasterCard PayPass, VISA paywave, and AmericanExpress ExpressPay Are they secure? J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 15 / 36
22 Background (II) MasterCard PayPass, VISA paywave, and AmericanExpress ExpressPay Are they secure? Amount limit on a single transaction Up to 20 GBP, 20, US$50, 50CHF, CAD$100, or AUD$100 J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 15 / 36
23 Background (II) MasterCard PayPass, VISA paywave, and AmericanExpress ExpressPay Are they secure? Amount limit on a single transaction Up to 20 GBP, 20, US$50, 50CHF, CAD$100, or AUD$100 *cof, cof* ( J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 15 / 36
24 Background (II) MasterCard PayPass, VISA paywave, and AmericanExpress ExpressPay Are they secure? Amount limit on a single transaction Up to 20 GBP, 20, US$50, 50CHF, CAD$100, or AUD$100 *cof, cof* ( Sequential contactless payments limited it asks for the PIN Protected by the same fraud guarantee as standard transactions (hopefully) J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 15 / 36
25 Background (III) Relay attacks On Numbers and Games, J. H. Conway (1976) Mafia frauds Y. Desmedt (SecuriCom 88) P V communication link P V Real-time fraud where a fraudulent prover P and verifier V cooperate J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 16 / 36
26 Background (III) Relay attacks On Numbers and Games, J. H. Conway (1976) Mafia frauds Y. Desmedt (SecuriCom 88) P V communication link P V Real-time fraud where a fraudulent prover P and verifier V cooperate Honest prover and verifier: contactless card and Point-of-Sale terminal Dishonest prover and verifier: two NFC-enabled Android devices J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 16 / 36
27 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 17 / 36
28 Android and NFC: A Tale of L ve (I) Recap on evolution of Android NFC support NFC operation modes supported Software Reader/Writer Peer-to-peer Hardware Card-emulation { Software Reader/Writer Peer-to-peer Card-emulation Hardware Card-emulation { Android Gingerbread (API level 10) Android 4.2 Jelly Bean (API level 17) Android CyanogenMod OS 9.1 Android 4.4 KitKat (API level 19) NfcA (ISO/IEC A) NfcB (ISO/IEC B) NfcBarcode IsoPcdA (ISO/IEC A) NfcAdapter.ReaderCallback added Ndef IsoDep (ISO/IEC ) IsoPcdB (ISO/IEC B) NfcV (ISO/IEC 15693) NfcF (JIS ) thanks to Doug Year NdefFormatable MifareClassic MifareUltralight J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 18 / 36
29 Android and NFC: A Tale of L ve (II) Digging into Android NFC stack Event-driven framework, nice API support Two native implementations (depending on built-in NFC chip) libnfc-nxp libnfc-nci J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 19 / 36
30 Android and NFC: A Tale of L ve (II) Digging into Android NFC stack Event-driven framework, nice API support Two native implementations (depending on built-in NFC chip) libnfc-nxp libnfc-nci NXP dropped in favour of NCI: Open architecture, not focused on a single family chip Open interface between the NFC Controller and the DH Standard proposed by NFC Forum J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 19 / 36
31 Android and NFC: A Tale of L ve (III) Digging into Android NFC stack Reader/Writer mode Not allowed to be set directly Android activity Android NFC service selects apps according to tag definition of Manifest file In low-level, libnfc-nci uses reliable mechanism of queues and message passing General Kernel Interface (GKI) Makes communication between layers and modules easier NFC developer framework User App Tag IPC mtagservice.transceive NfcService TagService DeviceHost.TagEndPoint <<realize>> NativeNfcTag JNI dotransceive System NFC Library NativeNfcTag.cpp libnfc-nci J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 20 / 36
32 Android and NFC: A Tale of L ve (IV) Digging into Android NFC stack HCE mode A service must be implemented to process commands and replies HostApduService abstract class, and processcommandapdu method AID-based routing service table This means you need to declare in advance what AID you handle! J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 21 / 36
33 Android and NFC: A Tale of L ve (V) Digging into Android NFC stack Summary Description Language(s) Dependency OSS NFC developer framework Java, C++ API level Yes (com.android.nfc package) System NFC library C/C++ Manufacturer Yes (libnfc-nxp or libnc-nci) NFC Android kernel driver C Hardware and manufacturer Yes NFC firmware ARM Thumb Hardware and No (/system/vendor/firmware directory) manufacturer Some useful links nfc-controller-interface-nci-specifications/ 20Specification.pdf J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 22 / 36
34 Android and NFC: A Tale of L ve (VI) Some remarkable limitations Limitation 1 Dishonest verifier communicates with a MIFARE Classic libnfc-nci do not allow sending raw ISO/IEC commands Caused by the CRC computation, performed by the NFCC Overcome whether NFCC is modified EMV contactless cards are IsoDep: fully ISO/IEC compliant J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 23 / 36
35 Android and NFC: A Tale of L ve (VI) Some remarkable limitations Limitation 1 Dishonest verifier communicates with a MIFARE Classic libnfc-nci do not allow sending raw ISO/IEC commands Caused by the CRC computation, performed by the NFCC Overcome whether NFCC is modified EMV contactless cards are IsoDep: fully ISO/IEC compliant Limitation 2 Dishonest prover communicates with a honest verifier Device in HCE mode AID must be known in advance Overcome whether device is rooted Xposed framework may help to overcome this issue, but needs root permissions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 23 / 36
36 Android and NFC: A Tale of L ve (V) Some remarkable limitations and remarks Limitation 3 Dishonest prover and a dishonest verifier communicate through a non-reliable peer-to-peer relay channel ISO/IEC defines the Frame Waiting Time as FWT = 256 (16/f c ) 2 FWI, 0 FWI 14, where f c = MHz J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 24 / 36
37 Android and NFC: A Tale of L ve (V) Some remarkable limitations and remarks Limitation 3 Dishonest prover and a dishonest verifier communicate through a non-reliable peer-to-peer relay channel ISO/IEC defines the Frame Waiting Time as FWT = 256 (16/f c ) 2 FWI, 0 FWI 14, where f c = MHz FWT [500µs, 5s] relay is theoretically possible when delay is 5s Concluding Remarks Any NFC-enabled device running OTS Android 4.4 can perform an NFC passive relay attack at APDU level when the specific AID of the honest prover is known and an explicit SELECT is performed J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 24 / 36
38 Android and NFC: A Tale of L ve (V) Some remarkable limitations and remarks Limitation 3 Dishonest prover and a dishonest verifier communicate through a non-reliable peer-to-peer relay channel ISO/IEC defines the Frame Waiting Time as FWT = 256 (16/f c ) 2 FWI, 0 FWI 14, where f c = MHz FWT [500µs, 5s] relay is theoretically possible when delay is 5s Concluding Remarks Any NFC-enabled device running OTS Android 4.4 can perform an NFC passive relay attack at APDU level when the specific AID of the honest prover is known and an explicit SELECT is performed Any communication involving a APDU-compliant NFC tag (i.e., MIFARE DESFire EV1, Inside MicroPass, or Infineon SLE66CL) can also be relayed J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 24 / 36
39 Android and NFC: A Tale of L ve (V) Some remarkable limitations and remarks Limitation 3 Dishonest prover and a dishonest verifier communicate through a non-reliable peer-to-peer relay channel ISO/IEC defines the Frame Waiting Time as FWT = 256 (16/f c ) 2 FWI, 0 FWI 14, where f c = MHz FWT [500µs, 5s] relay is theoretically possible when delay is 5s Concluding Remarks Any NFC-enabled device running OTS Android 4.4 can perform an NFC passive relay attack at APDU level when the specific AID of the honest prover is known and an explicit SELECT is performed Any communication involving a APDU-compliant NFC tag (i.e., MIFARE DESFire EV1, Inside MicroPass, or Infineon SLE66CL) can also be relayed And now, let s move to the practice J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 24 / 36
40 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 25 / 36
41 Relay Attack Implementation (I) Experiment configuration PoS device: Ingenico IWL280 with GRPS + NFC support Android app developed (±2000 LOC) Two OTS Android NFC-capable devices One constraint only: dishonest prover must run an Android 4.4 J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 26 / 36
42 Relay Attack Implementation (I) Experiment configuration PoS device: Ingenico IWL280 with GRPS + NFC support Android app developed (±2000 LOC) Two OTS Android NFC-capable devices One constraint only: dishonest prover must run an Android 4.4 J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 26 / 36
43 Relay Attack Implementation (II) Threat Scenarios Scenario 1 Distributed Mafia Fraud BOT BOT BOT BOT BOT BOTMASTER BOT J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 27 / 36
44 Relay Attack Implementation (III) Threat Scenarios Scenario 2 Hiding Fraud Locations J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 28 / 36
45 Relay Attack Implementation (IV) Resistant Mechanisms Brief summary of resistant mechanisms Distance-bounding protocols Upper bounding the physical distance using Round-Trip-Time of cryptographic challenge-response messages Timing constraints Not enforced in current NFC-capable systems The own protocol allows timing extension commands Physical countermeasures Whitelisting/Blacklisting random UID in HCE mode unfeasible RFID blocking covers Physical button/switch activation Secondary authentication methods (e.g., on-card fingerprint scanners) J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 29 / 36
46 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 30 / 36
47 Related Work On relay attacks First works built on specific hardware 2010 Nokia mobile phones with NFC capability plus a Java MIDlet app Relay attacks on Android accessing to Secure Elements A SE securely stores data associated with credit/debit cards Needs a non-ots Android device 2014 Active relay attacks with custom hardware and custom Android firmware Several works studied delay upon relay channel: Relay over long distances are feasible latency isn t a hard constraint Ask us for *specific* references, too many names for a single slide! J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 31 / 36
48 Agenda 1 Introduction 2 Background EMV Contactless Cards Relay Attacks and Mafia Frauds 3 Android and NFC: A Tale of L ve Evolution of NFC Support in Android Practical Implementation Alternatives in Android 4 Relay Attack Implementation Demo experiment Threat Scenarios Resistant Mechanisms 5 Related Work 6 Conclusions J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 32 / 36
49 Conclusions (I) Security of NFC is based on the physical proximity concern NFC threats: eavesdropping, data modification, relay attacks Android NFC-capable devices are rising Abuse to interact with cards in its proximity J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 33 / 36
50 Conclusions (I) Security of NFC is based on the physical proximity concern NFC threats: eavesdropping, data modification, relay attacks Android NFC-capable devices are rising Abuse to interact with cards in its proximity Conclusions Review of Android NFC stack Proof-of-Concept of relay attacks using Android OTS devices Threat scenarios introduced J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 33 / 36
51 Conclusions (I) Security of NFC is based on the physical proximity concern NFC threats: eavesdropping, data modification, relay attacks Android NFC-capable devices are rising Abuse to interact with cards in its proximity Conclusions Review of Android NFC stack Proof-of-Concept of relay attacks using Android OTS devices Threat scenarios introduced Virtual pickpocketing attack may appear before long! J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 33 / 36
52 Conclusions (II) But then, what the hell can I do?? Should I run away? J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 34 / 36
53 Conclusions (II) But then, what the hell can I do?? Should I run away? J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 34 / 36
54 Conclusions (II) But then, what the hell can I do?? Should I run away? J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 34 / 36
55 Conclusions (III) Future Work Develop/// ////////// a botnet////////////////// infrastructure///// and/////// earn///////// money Timing constraints of Android HCE mode Try active relay attacks within EMV contactless cards Acknowledgments Spanish National Cybersecurity Institute (INCIBE) University of León under contract X43 HITB staff J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 35 / 36
56 Conclusions (III) Future Work Develop/// ////////// a botnet////////////////// infrastructure///// and/////// earn///////// money Timing constraints of Android HCE mode Try active relay attacks within EMV contactless cards Acknowledgments Spanish National Cybersecurity Institute (INCIBE) University of León under contract X43 HITB staff And thanks to all for hearing us! Visit for more info about the project J. Vila, R. J. Rodríguez Relay Attacks in EMV Contactless Cardswith Android OTS Devices HITB 15 AMS 35 / 36
57 Relay Attacks in EMV Contactless Cards with Android OTS Devices José Vila, Ricardo J. Rodríguez All wrongs reversed Computer Science and Research Institute of Systems Engineering Dept. Applied Sciences in Cybersecurity University of Zaragoza, Spain University of León, Spain May 28, 2015 Hack in the Box 2015 Amsterdam (Nederland)
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! New site live: blackwinghq.com! We re always
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
Training. NFC in Android. Public. MobileKnowledge October 2015
NFC in Android Public MobileKnowledge October 2015 Index Android mobile Operating System Market share Brief history Programing in Android NFC in Android Communicating my Android phone with NFC Readers
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
NFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
AN11269. Software Design Guide for POS Development Kit OM5597/RD2663. Rev. 1.0 5 August 2014 242510. Application note COMPANY PUBLIC
Software Design Guide for POS Development Kit OM5597/RD2663 Document information Info Content Keywords RC663, TDA8026, LPC1768, Point of Sale Development Kit design, POS, guide, firmware documentation,
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
How To Secure A Paypass Card From Being Hacked By A Hacker
PayPass Vulnerabilities Balázs Bucsay http://rycon.hu - earthquake_at_rycon_dot_hu PR-Audit Kft. http://www.praudit.hu/ PayPass PayPass lets you make everyday purchases without having to swipe the magnetic
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Dresden, 22/11/2013 Felipe de Sousa Silva Outline NFC Overview NFC Public Ticket System. Intention of the Inverse Reader Mode The Inverse
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Christian Saminger, Stefan Grünberger and Josef Langer NFC University of Applied Sciences Upper Austria 5 th International Workshop
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
Contactless Payments with Mobile Wallets. Overview and Technology
Contactless Payments with Mobile Wallets Overview and Technology History of Contactless Systems Upass (smartcard) a pre-paid card for the transportation system in Seoul and its suburbs, first used in
Risks of Offline Verify PIN on Contactless Cards
Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nicholas Little, and Aad van Moorsel School of Computing Science, Newcastle University, Newcastle upon Tyne, UK {martin.emms,budi.arief,n.little,aad.vanmoorsel}@ncl.ac.uk
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT [email protected] Hackito Ergo Sum 2012 April 12,13,14 Paris, France
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT [email protected] Hackito Ergo Sum 2012 April 12,13,14 Paris, France Speaker's bio French computer security engineer working at
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
Using an NFC-equipped mobile phone as a token in physical access control
University of Twente Faculty of electrical engineering, mathematics and computer science Nedap Securiy Management Using an NFC-equipped mobile phone as a token in physical access control Author: Martijn
Mobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan 1 Near Field
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
Mobile Payment using HCE and mpoint payment gateway based on NFC enabled phones. AUTHOR : GRZEGORZ MILCARZ S111040
Mobile Payment using HCE and mpoint payment gateway based on NFC enabled phones. AUTHOR : GRZEGORZ MILCARZ S111040 DATE NOVEMBER 27, 2014 Summary The goal of the thesis is to create a proof of concept
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
MIFARE ISO/IEC 14443 PICC
Rev. 3.0 26 June 2009 130830 Application note PUBLIC Document information Info Keywords Abstract Content Activate Card, MIFARE, Select Card This Application te shows the elementary communication for selecting
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
welcome to liber8:payment
liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience
Near Field Communication in Cell Phones
Near Field Communication in Cell Phones Annika Paus 24.07.2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 Standards
NFC technology user guide. Contactless payment by mobile
Contactless payment by mobile Table of contents 1. What is contactless payment by mobile? 2. What do I need to shop with my mobile phone? 3. How can I manage a Mobile Card? 4. How do I shop with my mobile
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
NFC Application Mobile Payments
NFC Application Mobile Payments Public MobileKnowledge June 2014 Agenda Introduction to payments Card based payments Mobile based payments NFC based payments mpos solutions NXP Product portfolio Successful
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.
PCI 3.1 Changes Jon Bonham, CISA Coalfire System, Inc. Agenda Introduction of Coalfire What does this have to do with the business office Changes to version 3.1 EMV P2PE Questions and Answers Contact Information
Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015
Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland NFC Research Lab Hagenberg University of Applied Sciences Upper Austria Softwarepark 11, 4232
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, [email protected]
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
a leap ahead in analog
EMV Contactless Payment Systems based on AS3911 Overview and System Simulations Giuliano Manzi, PhD Mannheim, May 23 25, 2012 CST EUROPEAN USER CONFERENCE 2012 a leap ahead in analog OUTLINE AS3911 OVERVIEW
Chytré karty opět o rok dál...
Chytré karty opět o rok dál... SmartCardForum 2010 Jan Němec Product expert, Gemalto Květen 2010 Agenda Chytré karty včera, dnes a zítra Úvod do problematiky NFC Integrace NFC do mobilních zařízení Java
PCI and EMV Compliance Checkup
PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations
Security Analysis of Mobile Payment Systems
Security Analysis of Mobile Payment Systems Atul Kumar EIT ICT Labs Master School University of Twente Under Supervision of: Prof. Dr. F.E. Kargl The Services, Cybersecurity and Safety Research Group University
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
Ingenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
The SmartLogic Tool: Analysing and Testing Smart Card Protocols
The SmartLogic Tool: Analysing and Testing Smart Card Protocols Gerhard de Koning Gans, Joeri de Ruiter Digital Security, Radboud University Nijmegen The SmartLogic Tool A tool to analyse, emulate and
The mobile phone as a contactless ticket
The mobile phone as a contactless ticket Magnus Egeberg Master of Science in Communication Technology Submission date: June 2006 Supervisor: Van Thanh Do, ITEM Co-supervisor: Juan Carlos Lopez Calvet,
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited
Mobile NFC 101 Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited Company Lateral Security (IT) Services Limited Company Overview Founded in April 2008
Application of Near Field Communication Technology for Mobile Airline Ticketing
Journal of Computer Science 8 (8): 1235-1243, 2012 ISSN 1549-3636 2012 Science Publications Application of Near Field Communication Technology for Mobile Airline Ticketing Wayan Suparta Institute of Space
DEVELOPING NFC APPS for BLACKBERRY
1 DEVELOPING NFC APPS for BLACKBERRY NFC Forum, Developers Showcase March 21 st, 2014 Larry McDonough, Principal Evangelist @LMCDUNNA 2 CONTENTS Development on BlackBerry BlackBerry NFC Support 5 most
permitting close proximity communication between devices in this case a phone and a terminal.
MOBILE PAYMENT What it is. How it works. What it means for Canadians. By EnStream LP for the House of Commons Finance Committee February 13, 2014 INTRODUCTION EnStream was established by Bell, Rogers and
ACR120 Technical Specifications version 2.9 November 2005
Version 2.9 11-2005, Email: [email protected] Website: www.acs.com.hk ACR120 Contactless Reader/Writer 1.0 Introduction The ACR120 is a compact and cost-effective contactless reader and writer. It is developed
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
Credit Card Fraud The Contactless Generation Kristin Paget
Credit Card Fraud The Contactless Generation Kristin Paget Chief Hacker, Recursion Ventures [email protected] @KrisPaget WHAT'S COMING UP? Contactless payments What is EMV? How does NFC fit in? Threat
Workshop: NEAR FIELD COMMUNICATION TECHNOLOGY
Workshop: NEAR FIELD COMMUNICATION TECHNOLOGY RODOLFO VELTRI GOMES Customer Application Support NFC/RFID Europe NXP Semiconductors Italia SpA RF Wireless Forum Milano - 14 Febbraio, 2008 NXP Automotive
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
Mobile/NFC Standards Landscape Reference Guide
Mobile/NFC Standards Landscape Reference Guide A Smart Card Alliance Mobile and NFC Council Resource Publication Date: November 2012 Publication Number: MNFCC-12001 Smart Card Alliance 191 Clarksville
Secure Element Deployment & Host Card Emulation v1.0
Secure Element Deployment & Host Card Emulation v1.0 2 Document History Version Date Editor Remarks 1.0 29/04/2014 HCE Taskforce Public release Copyright 2014 SIMalliance ltd. The information contained
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Index. 1-FLYPOS hardware/firmware Technology Overview 2-FLYPOS software architecture 3-Gateway/Acquirer Interface 4-Letters of Approval
FLYPOS Index 1-FLYPOS hardware/firmware Technology Overview 2-FLYPOS software architecture 3-Gateway/Acuirer Interface 4-Letters of Approval 2 1- FLYPOS hardware/firmware Technology Overview 3 FLYPOS Technology
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
Mobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Relay attacks on card payment: vulnerabilities and defences
Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin,
NFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
Threat Modeling for offline NFC Payments
Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
BGS MOBILE PLATFORM HCE AND CLOUD BASED PAYMENTS
HCE AND CLOUD BASED PAYMENTS 1 Contactless payments are vital for further development of the payment industry. More than 3 mln POS terminals around the globe can accept contactless payments. Mobile phones
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10
APPFORUM2014 Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 NFC OVERVIEW Chuck Bolen Chief Architect Enterprise Mobile Computing APPFORUM2014
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.
Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
NFC technology user guide. Contactless payment by mobile
Contactless payment by mobile Table of contents 1. What is contactless payment by mobile? 2. What do I need to shop with my mobile phone? 3. How can I manage a Mobile Card? 4. How do I shop with my mobile
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Documentation of Use Cases for NFC Mobile Devices in Public Transport
NFC Forum TM Market Requirements Document Documentation of Use Cases for NFC Mobile Devices in Public Transport Version 1.7.3 / 2015-06-19 Transport SIG WORKING DOCUMENT This document is copyright 2015
NFC Tags & Solutions. Understanding Near Field Communication (NFC) Technology. Executive Summary
NFC Tags & Solutions Understanding Near Field Communication (NFC) Technology Executive Summary Payment systems and marketing loyalty programs are just the beginning for NFC technology. In addition to the
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
arxiv:1209.0875v2 [cs.cr] 25 Mar 2013 Technical Report Applying recent secure element relay attack scenarios to the real world: Abstract Michael Roland NFC Research Lab Hagenberg University of Applied
A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2
A MOBILE PAYMENT SYSTEM WITH AN EXTRA TOKEN OF SECURITY Nael Hirzallah 1 and Sana Nseir 2 1 Applied Science University, Amman, Jordan 2 Zarqa University, Zarqa, Jordan ABSTRACT: The number of people using
