2015
DOI: 10.1007/s13389-015-0112-3
|View full text |Cite
|
Sign up to set email alerts
|

When organized crime applies academic results: a forensic analysis of an in-card listening device

Abstract: International audienceThis paper describes the forensic analysis of what the authors believe to be the most sophisticated smart card fraud encountered to date. In 2010, Murdoch et al. (IEEE Symposium on Security and Privacy, pp 433–446, 2010) described a man-in-the-middle attack against EMV cards. Murdoch et al. (IEEE Symposium on Security and Privacy, pp 433–446, 2010) demonstrated the attack using a general purpose FPGA board, noting that “miniaturization is mostly a mechanical challenge, and well within the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…Even though Murdoch et al's attack comes with some engineering challenges, such as miniaturizing the MITM infrastructure, these challenges appear to have been overcome as observed in the aforementioned forgery of credit cards in France and Belgium [10]. Our analysis demonstrates that this attack still exists in old cards that support neither asymmetric cryptography nor online PIN verification (see Section V-A).…”
Section: Related Workmentioning
confidence: 79%
See 1 more Smart Citation
“…Even though Murdoch et al's attack comes with some engineering challenges, such as miniaturizing the MITM infrastructure, these challenges appear to have been overcome as observed in the aforementioned forgery of credit cards in France and Belgium [10]. Our analysis demonstrates that this attack still exists in old cards that support neither asymmetric cryptography nor online PIN verification (see Section V-A).…”
Section: Related Workmentioning
confidence: 79%
“…The MITM attack reported by Murdoch et al [1] is believed to have been used by criminals in 2010 -11 in France and Belgium to carry out fraudulent transactions for ca. 600,000 Euros [10]. The underlying flaw of Murdoch et al's attack is that the card's response to the terminal's offline PIN verification request is not authenticated.…”
Section: Emv: 20 Years Of Vulnerabilitiesmentioning
confidence: 99%
“…Do not mix italics and quotes for emphasis, because this confuses the reader. 16 Generally, we recommend avoiding scare quotes. 17 Some authors use scare quotes to signal that they are using a word in a non-standard, ironic, or otherwise special sense (cf.…”
Section: Typographymentioning
confidence: 99%
“…Therefore the system, and the consistency of the measured and exchanged voltage and current data with known cable parameters and model, can be checked continuously and deterministically without destroying these data, which is totally different from the case of a quantum key distribution. The same defense method provides natural immunity against the man-in-the-middle attack [11], which was part of the successful credit card attack described before [1].…”
Section: The Kljn Key Exchange Schemementioning
confidence: 99%