2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.11
|View full text |Cite
|
Sign up to set email alerts
|

Chip and Skim: Cloning EMV Cards with the Pre-play Attack

Abstract: Abstract-EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. We have discovered two serious problems: a widespread implementation flaw and a de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 82 publications
(58 citation statements)
references
References 12 publications
0
58
0
Order By: Relevance
“…So, for PaySafe we must stop a single run of the protocol from accepting multiple GPO messages with different nonces. Clearly, our protocol only works if the nonces are actually unpredictable, unfortunately some EMV terminals have been shown to use predictable numbers [5].…”
Section: Implementing Paysafementioning
confidence: 99%
“…So, for PaySafe we must stop a single run of the protocol from accepting multiple GPO messages with different nonces. Clearly, our protocol only works if the nonces are actually unpredictable, unfortunately some EMV terminals have been shown to use predictable numbers [5].…”
Section: Implementing Paysafementioning
confidence: 99%
“…The very recent "Chip and Skim" attack [1] is similar to our attack in that it could be operated on a large scale and it extracts money from the victim's account. It would be interesting to explore the possibility of using our mobile phone contactless-transactioncollecting app as the "skimming" platform for the Chip and Skim attack.…”
Section: While the Emv Protocol Requires Payment Cards To Authenticatmentioning
confidence: 94%
“…Hence, there has been a growing revelation and understanding of the vulnerabilities. EMV can be cracked [21], as can GSM [22]. Applications using these protocols should consider cellular and NFC attack surfaces in addition to the conventional higher-level, TCP/IP stack protocols.…”
Section: Communication Attack Surfacesmentioning
confidence: 99%