Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack

نویسنده

  • Michael Roland
چکیده

This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how these relay attacks can be applied to the Google Wallet. Finally, it gives an overview of the components and results of a successful attempt to relay an EMV Mag-Stripe transaction between a Google Wallet device and an external card emulator over a wireless network. Revision: 1.3 Date: March 25, 2013 Status: Final This work is part of the project “4EMOBILITY” within the EU programme “Regionale Wettbewerbsfähigkeit OÖ 2007–2013 (Regio 13)” funded by the European regional development fund (ERDF) and the Province of Upper Austria (Land Oberösterreich). Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack Michael Roland 1 ar X iv :1 20 9. 08 75 v2 [ cs .C R ] 2 5 M ar 2 01 3 Hagenberg Linz Steyr Wels A revised version of this report has been published as M. Roland, J. Langer, and J. Scharinger: Applying Relay Attacks to Google Wallet. In: Proceedings of the 5th International Workshop on Near Field Communication (NFC 2013), pp. 1–6, Zurich, Switzerland, Feb. 2013. DOI: 10.1109/NFC.2013.6482441, c © 2013 IEEE. The revised version gives a more detailed analysis of the Google Wallet oncard component, adds new ideas on how to improve the attack, details further information on our test setup, and adds an analysis of Google’s approach to fix the vulnerability. Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack Michael Roland 2 Hagenberg Linz Steyr Wels

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data

Over the past decade, smartphones have become the point of convergence for many applications and services. There is a growing trend in which traditional smart-card based services like banking, transport and access control are being provisioned through smartphones. Smartphones with Near Field Communication (NFC) capability can emulate a contactless smart card; popular examples of such services i...

متن کامل

Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited

Near Field Communication’s card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly di↵erent threat vector. A mobile phone’s ...

متن کامل

Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?

Software card emulation is a new approch to advance the interoperability of NFC with legacy contactless smartcard systems. It has been first introduced to NFC-enabled mobile phones by Research In Motion (RIM) on their BlackBerry platform. Software card emulation aims at opening and simplifying the complex and tightly controlled card emulation functionality. While this form of card emulation, th...

متن کامل

Quality of Service (QoS) and Security Provisioning in Cooperative Mobile Ad Hoc Networks (MANETs)

Cooperative communication can improve communication quality in wireless communication networks through strategic relay selection. However, wireless cooperative communication networks are vulnerable to the attacks initiated on relays. Although applying authentication protocols can secure cooperative communication when the selected relay is malicious, better system throughput could be obtained wi...

متن کامل

Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks

The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1209.0875  شماره 

صفحات  -

تاریخ انتشار 2012