SLIDE 7 7
25
Payment card ‘cloning’ via NFC
- First generation contactless cards had
rudimentary security
− Card authentication with static data
− MIDlet on NFC phone reads card data. − No code signing required.
− Unlock SE. − Load Java card applet with payment AID.
- Worked on POS system in lab
[ L. Francis,G. Hancke, K. Mayes, and K. Markantonakis, Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms," Proceedings of The First International Workshop on RFID Security and Cryptography, (RISC 2009), UK] 26
Proof-of-Concept NFC Relay Experiment
- Two NFC enabled mobile phones operating in P2P
mode and participating in a legitimate transaction.
− Phone-A intends to interact with Phone-B. − Introduce two additional proxy phones (Proxy-A and Proxy-B) to relay the communication.
[ L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, "Practical NFC Peer- to-Peer Relay Attack using Mobile Phones". 6th Workshop on RFID Security (RFIDSec 2010), June 7 - 9, 2010, Istanbul, Turkey]. 27
Trusted NFC Phone platform?
Security Applications go here… Malware goes here!
Image from Vikas Rajole MSc report 2011
'Safebot' malware running as 'root' user
28
Conclusion/Comments
- Smart Cards have been evolving and changing from cards with
contacts to contactless cards and RFIDs.
- The need for attack resistant hardware remains as cards/RFIDs
are targeted by organised hacker/enthusiast communities.
- Near Field Communications offers possibility of using the mobile
phone instead of smartcards/RFIDs or their readers.
- Security concerns around NFC have let to the definition of
Security Elements, but several competing options.
- NFC reader mode does not use the SE and so applications are at
risk from phone vulnerabilities.
- Phone architectures are complex and there are published attacks.
- NFC phones are attracting interest as convenient attack platforms!