2017
DOI: 10.1109/msp.2017.27
|View full text |Cite
|
Sign up to set email alerts
|

Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Such an unusual design for a payment protocols offers at least two opportunities for an attacker to obtain payment card details. Firstly, it is well-known for a contactless card that card number and expiry date could be skimmed from a distance with any NFC enabled device [24] [41] and in fact, in a single google play search, we located 38 freely available Android apps which could be used by an attacker to read the contactless payment cards. Another channel that an adversary can follow to obtain the card number details is from the merchants sales receipt from reader Point of Sale (POS) terminal.…”
Section: Cnp Payments -Technology Limitations and Attacker Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Such an unusual design for a payment protocols offers at least two opportunities for an attacker to obtain payment card details. Firstly, it is well-known for a contactless card that card number and expiry date could be skimmed from a distance with any NFC enabled device [24] [41] and in fact, in a single google play search, we located 38 freely available Android apps which could be used by an attacker to read the contactless payment cards. Another channel that an adversary can follow to obtain the card number details is from the merchants sales receipt from reader Point of Sale (POS) terminal.…”
Section: Cnp Payments -Technology Limitations and Attacker Methodsmentioning
confidence: 99%
“…It can be learned from a card number that customer account number fills nine spaces and therefore, the maximum number of possible active card numbers for a bank would be one less to 109 (a billion). An attacker starts after selecting target banks BIN (bank with a high number of customers would give high positives), randomly generates thousands of accounts number using Luhn's check algorithm [44] (or with automated bots as demonstrated in [41]) and makes transactions using the generated card numbers on online payment websites. When a transaction is made, a transaction authorization request is sent by the merchant to the card issuing bank.…”
Section: Merchant Receipts and Guessable Card Numbersmentioning
confidence: 99%
See 1 more Smart Citation
“…-4th Attack: in the case of small merchants, the mobile PoS is less secure than the professional PoS, because during a contact or an NFC purchase transaction, the merchant's smartphone receives the banking data from the mobile PoS without encryption: android's attackers can then retrieve the banking data [29] [30]. -5th Attack: recently, authors in [31] show an attack by brute force where it is possible to easily and quickly obtain the ExpDate and the security code using only the PAN. They carried out this attack first to obtain the ExpDate from the PAN as follows: by using a website that does not ask for the security code and does not block this type of brute force attack, they tested all possible combinations month/year taking into account 5 years as a maximum duration of validity (12 months * 5 years = 60 tests).…”
Section: A Attacks Due To Emv Vulnerabilitiesmentioning
confidence: 99%
“…The increased convenience, though, comes with inherent security risks [1]. The cybercrime involving online payment services often has the characteristics of diversification, specialization, industrialization, concealment, scenario, and cross-region, which makes the security prevention and control of online payment extremely challenging [2]. There is an urgent need for realizing effective and comprehensive online payment fraud detection.…”
Section: Introductionmentioning
confidence: 99%