Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417235
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Implementation of Relay-Resistant Contactless Payments

Abstract: Contactless systems, such as the EMV (Europay, Mastercard and Visa) payment protocol, are vulnerable to relay attacks. The typical countermeasure to this relies ondistance bounding protocols, in which a reader estimates an upper bound on its physical distance from a card by doing round-trip time (RTT) measurements. However, these protocols are trivially broken in the presence of rogue readers. At Financial Crypto 2019, we proposed two novel EMV-based relayresistant protocols: they integrate distance-bounding w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…First, neither our framework nor those proposed in [19,44,45] take mobility into account. We think that this is achievable following the approach recently proposed in [13]. This model allows agents to perform arbitrary movements as soon as they do not move faster than messages.…”
Section: Discussionmentioning
confidence: 99%
“…First, neither our framework nor those proposed in [19,44,45] take mobility into account. We think that this is achievable following the approach recently proposed in [13]. This model allows agents to perform arbitrary movements as soon as they do not move faster than messages.…”
Section: Discussionmentioning
confidence: 99%
“…RRP was first formally verified in [5]. [44] performs a timing analysis of RRP and finds it secure, but without varying the positions of the card in the field, as we do.…”
Section: Related Workmentioning
confidence: 98%
“…Symbolic Verification of EMV: Past symbolic-verification models of EMV include [48], [2], [8] and of EMV with distance bounding [47], [26], [5], [49], [44].…”
Section: Related Workmentioning
confidence: 99%
“…The recent work of Basin, Sasse, and Toro-Pozo [6] contains an overview of attacks on EMV that can lead to fraudulent transactions, e.g., criminals can make high-value purchases using a contactless Visa card without knowing the PIN. Contactless specific relay attacks may be mitigated by using distance-bounding techniques [7], e.g., Boureanu et al verified Mastercard's relay-resistant EMV protocol PayPass-RRP [8].…”
Section: Related Workmentioning
confidence: 99%