Banking Security Architecture
Banking Security Architecture
Steven J. Murdoch
http://www.cl.cam.ac.uk/users/sjm217/
250
200
Losses (m)
150
Cardnotpresent
Counterfeit
Mail nonreceipt
50
Cheque fraud
ID theft
Online banking
0
Source: APACS
Counterfeit fraud mainly exploited
backwards compatibility features
Criminals collected:
card details by a double-swipe, or
tapping the terminal/phone line
PIN by setting up a camera, tapping
the terminal, or just watching
Cloned magstrip card then used in an
ATM (typically abroad)
In some ways, Chip & PIN made the
situation worse
PINs are used much more often (not
just ATM)
PoS terminals are harder to secure
than an ATM Tonight (ITV, 2007-05-04)
Terminal tamper proofing is supposed
to protect the PIN in transit
Ingenico i3300
Protection measures: tamper switches
Ingenico i3300
Protection measures: tamper meshes
Ingenico i3300
Protection measures: tamper meshes
Ingenico i3300
BBC Newsnight filmed our
demonstration for national TV
Cardholder Merchant
Terminology
Payment system network
(MasterCard/Visa/etc.)
Authorization
Card presented
Cardholder Merchant
Terminology
Payment system network
(MasterCard/Visa/etc.)
Authorization
Card presented
Cardholder Merchant
Goods received
Simplified Chip & PIN transaction
$
issuer
merchant
We got our highest ratings of the run for the story (6.2 million, making
it the most watched factual programme of last week)... its provoked
quite a response from viewers. Rob Unsworth, Editor, Watchdog
Our demonstration helped many cardholders reach a favourable
resolution with banks
The relay attack: Alice thinks she is
paying $20, but is actually charged
$2 000 for a purchase elsewhere
$
Dave
Alice
PIN
Honest cardholder Alice and merchant Dave are unwitting participants in the
relay attack
The relay attack: Alice thinks she is
paying $20, but is actually charged
$2 000 for a purchase elsewhere
$
Bob PIN
Dave
Alice
PIN
Carol
$20 $2000
Alice inserts her card into Bobs fake terminal, while Carol inserts a fake
card into Daves real terminal. Using wireless communication the $2 000
purchase is debited from Alices account
The no-PIN attack
Skimming
iCVV: Slightly modifying copy of magnetic strip stored on chip
Disabling fallback: Preventing magnetic strip cards from being
used in EMV-enabled terminals
Better control of terminals: Prevent skimmers from being installed
YES-card
Dynamic Data Authentication (DDA): Place a public/private
keypair on every card
Online authorization: Require that all transactions occur online
No-PIN attack
Defences currently still being worked on
Extra consistency checks at issuer may be able to spot the attack
Combined DDA/Application Cryptogram Generation (CDA): Move
public key authentication stage to the end
Online banking fraud is a significant
and growing problem in the UK
On-screen keyboards
Picture passwords
Device fingerprinting
One-time-passwords/iTAN
On-screen keyboards
Picture passwords
Device fingerprinting
One-time-passwords/iTAN
On-screen keyboards
Picture passwords
Device fingerprinting
One-time-passwords/iTAN
On-screen keyboards
Picture passwords
Device fingerprinting
One-time-passwords/iTAN
On-screen keyboards
Picture passwords
Device fingerprinting
One-time-passwords/iTAN
SecureBank Inc. $
Embed challenge
in a CAPTCHA
style image,
along with
transaction
Involving a
human can
defeat this
May move the
fraud to easier
banks
SecureBank Inc.
login: Vic Tim
code: 7365 5748
PIN
$20
HHD 1.3 (standard from ZKA, Germany) is stronger than UK CAP, but
more typing is required
Many more modes, selected by initial digits of challenge
Mode number alters the meaningful prompts
Up to 7 digit nonce for all modes
Nonce, and mode number, are included in MAC
PIN verification is optional