COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Group meeting presentations > Chip and Skim: cloning EMV cards with the pre-play attack
Chip and Skim: cloning EMV cards with the pre-play attackAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Steven J. Murdoch. EMV , also known as “Chip and PIN ”, is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered two serious problems: a widespread implementation flaw and a deeper, more difficult to fix flaw with the EMV protocol itself. The first flaw is that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this nonce. This exposes them to a “pre-play” attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically. Card cloning is the very type of fraud that EMV was supposed to prevent. We describe how we detected the vulnerability, a survey methodology we developed to chart the scope of the weakness, evidence from ATM and terminal experiments in the field, and our implementation of proof-of-concept attacks. We found flaws in widely-used ATMs from the largest manufacturers. We can now explain at least some of the increasing number of frauds in which victims are refused refunds by banks which claim that EMV cards cannot be cloned and that a customer involved in a dispute must therefore be mistaken or complicit. The second problem was exposed by the above work. Independent of the random number quality, there is a protocol failure: the actual random number generated by the terminal can simply be replaced by one the attacker used earlier when capturing an authentication code from the card. This variant of the pre-play attack may be carried out by malware in an ATM or POS terminal, or by a man-in-the-middle between the terminal and the acquirer. We explore the design and implementation mistakes that enabled these flaws to evade detection until now: shortcomings of the EMV specification, of the EMV kernel certification process, of implementation testing, formal analysis, and monitoring customer complaints. Finally we discuss countermeasures. More than a year after our initial responsible disclosure of these flaws to the banks, action has only been taken to mitigate the first of them, while we have seen a likely case of the second in the wild, and the spread of ATM and POS malware is making it ever more of a threat. This talk is part of the Computer Laboratory Security Group meeting presentations series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsEnterprise Tuesday 2012/2013 Thin Film Magnetic Talks Analysis Seminar Cambridge Review of International Affairs The obesity epidemic: Discussing the global health crisis Biocomputing WorkshopsOther talksSymplectic topology of K3 surfaces via mirror symmetry Cafe Synthetique: Synthetic Biology Industry Night Fukushima and the Law The Beginning of Our Universe and what we don't know about Physics Wetting and elasticity: 2 experimental illustrations Modulating developmental signals allows establishment of cultures of expanded potential stem cells Cambridge - Corporate Finance Theory Symposium September 2017 - Day 1 'Ways of Reading, Looking, and Imagining: Contemporary Fiction and Its Optics' Understanding mechanisms and targets of malaria immunity to advance vaccine development Networks, resilience and complexity Scale and anisotropic effects in necking of metallic tensile specimens Transcriptional control of pluripotent stem cell fate by the Nucleosome Remodelling and Deacetylation (NuRD) complex |