Abstract
In a contactless transaction, when more than one card is presented to the payment terminal’s field, the terminal does not know which card to choose to proceed with the transaction. This situation is called card collision. EMV (which is the primary standard for smart card payments) specifies that the reader should not proceed when it detects a card collision and that instead it should notify the payer. In comparison, the ISO/IEC 14443 standard specifies that the reader should choose one card based on comparing the UIDs of the cards detected in the field. However, our observations show that the implementation of contactless readers in practice does not follow EMV’s card collision algorithm, nor does it match the card collision procedure specified in ISO. Due to this inconsistency between the implementation and the standards, we show an attack that may compromise the user’s privacy by collecting the user's payment details. We design and implement a malicious app simulating an NFC card which the user needs to install on her phone. When she aims to pay contactlessly while placing her card close to her phone, this app engages with the terminal before the card does. The experiments show that even when the terminal detects a card collision (the app essentially acts like a card), it proceeds with the EMV protocol. We show the app can retrieve from the terminal the transaction data, which include information about the payment such as the amount and date. The experimental results show that our app can effectively spy on contactless payment transactions, winning the race condition caused by card collisions around 66% when testing with different cards. By suggesting these attacks we raise awareness of privacy and security issues in the specifications, standardisation and implementations of contactless cards and readers.
| Original language | English |
|---|---|
| Title of host publication | Security Standardisation Research - 3rd International Conference, SSR 2016, Proceedings |
| Editors | David McGrew, Chris Mitchell, Lidong Chen |
| Publisher | Springer Verlag |
| Pages | 92-111 |
| Number of pages | 20 |
| ISBN (Print) | 9783319490991 |
| DOIs | |
| Publication status | Published - 2016 |
| Event | 3rd International Conference on Security Standardisation Research, SSR 2016 - Gaithersburg, United States Duration: 5 Dec 2016 → 6 Dec 2016 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 10074 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 3rd International Conference on Security Standardisation Research, SSR 2016 |
|---|---|
| Country/Territory | United States |
| City | Gaithersburg |
| Period | 5/12/16 → 6/12/16 |
Bibliographical note
Publisher Copyright:© Springer International Publishing AG 2016.
Keywords
- Card collision
- Contactless payment
- EMV
- NFC payment
- NFC phone
- Privacy attack
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science
Fingerprint
Dive into the research topics of 'Nfc payment spy: A privacy attack on contactless payments'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver