Security of Near Field Communication: Does My Phone Need A Tinfoil - - PowerPoint PPT Presentation

security of near field communication does my phone need a
SMART_READER_LITE
LIVE PREVIEW

Security of Near Field Communication: Does My Phone Need A Tinfoil - - PowerPoint PPT Presentation

Security of Near Field Communication: Does My Phone Need A Tinfoil Hat? Thomas Harren University of Minnesota, Morris April 30, 2015 1 / 45 Have you used NFC? Note: The communication standard used in UCard was not verifjed 2 / 45 1 meter


slide-1
SLIDE 1

Security of Near Field Communication: Does My Phone Need A Tinfoil Hat?

Thomas Harren

University of Minnesota, Morris

April 30, 2015

1 / 45

slide-2
SLIDE 2

Have you used NFC?

2 / 45 Note: The communication standard used in UCard was not verifjed

slide-3
SLIDE 3

Defjnition Near Field Communication or NFC

is a short-range contactless communication technology.

  • 1 meter range
  • Quick setup
  • Line of sight not required

3 / 45

slide-4
SLIDE 4

Defjnition Near Field Communication or NFC

is a short-range contactless communication technology.

  • 1 meter range
  • Quick setup
  • Line of sight not required

3 / 45

slide-5
SLIDE 5

Motivation

Questions about NFC

  • What is NFC and how does it work?
  • Is it secure and should I trust it?
  • Is NFC the future?

4 / 45

slide-6
SLIDE 6

Outline

Background Contactless Credit Cards NFC and Mass Transit Ticketing EnGarde: Physical NFC Security Conclusion

5 / 45

slide-7
SLIDE 7

Background

Background Elements of RFID: Tags & Readers NFC on Mobile Phones Security for NFC Contactless Credit Cards NFC and Mass Transit Ticketing EnGarde: Physical NFC Security Conclusion

Background 6 / 45

slide-8
SLIDE 8

Introduction to RFID

  • NFC is based on radio frequency identifjcation (RFID) technology
  • Range depends on frequency, size of antenna, power, and

interference

  • Communication happens between tags and readers

Background Elements of RFID: Tags & Readers 7 / 45

slide-9
SLIDE 9

Introduction to RFID

  • NFC is based on radio frequency identifjcation (RFID) technology
  • Range depends on frequency, size of antenna, power, and

interference

  • Communication happens between tags and readers

Background Elements of RFID: Tags & Readers 7 / 45

slide-10
SLIDE 10

Introduction to RFID

  • NFC is based on radio frequency identifjcation (RFID) technology
  • Range depends on frequency, size of antenna, power, and

interference

  • Communication happens between tags and readers

Background Elements of RFID: Tags & Readers 7 / 45

slide-11
SLIDE 11

Tags & Readers

Tag

  • A tiny circuit with an antenna coil
  • Stores limited information
  • Can be powered or passive
  • Passive tags are smallest and

cheapest

Reader

  • Reader generates an

electromagnetic fjeld using an antenna coil

  • The tags coil receives power from

the fjeld

  • Initiates communication

Background Elements of RFID: Tags & Readers 8 / 45

slide-12
SLIDE 12

Tags & Readers

Tag

  • A tiny circuit with an antenna coil
  • Stores limited information
  • Can be powered or passive
  • Passive tags are smallest and

cheapest

Reader

  • Reader generates an

electromagnetic fjeld using an antenna coil

  • The tags coil receives power from

the fjeld

  • Initiates communication

Background Elements of RFID: Tags & Readers 8 / 45

slide-13
SLIDE 13

Contactless Communication

RFID Communication

1

Reader generates a fjeld

2

Tag is activated by induced power

3

Reader runs discovery protocol, selecting tag by unique ID

4

Communication ensues

Background Elements of RFID: Tags & Readers 9 / 45

slide-14
SLIDE 14

Contactless Communication

RFID Communication

1

Reader generates a fjeld

2

Tag is activated by induced power

3

Reader runs discovery protocol, selecting tag by unique ID

4

Communication ensues

Background Elements of RFID: Tags & Readers 9 / 45

slide-15
SLIDE 15

Contactless Communication

RFID Communication

1

Reader generates a fjeld

2

Tag is activated by induced power

3

Reader runs discovery protocol, selecting tag by unique ID

4

Communication ensues

Background Elements of RFID: Tags & Readers 9 / 45

slide-16
SLIDE 16

Contactless Communication

RFID Communication

1

Reader generates a fjeld

2

Tag is activated by induced power

3

Reader runs discovery protocol, selecting tag by unique ID

4

Communication ensues

Background Elements of RFID: Tags & Readers 9 / 45

slide-17
SLIDE 17

Contactless Communication

RFID Communication

1

Reader generates a fjeld

2

Tag is activated by induced power

3

Reader runs discovery protocol, selecting tag by unique ID

4

Communication ensues

Background Elements of RFID: Tags & Readers 9 / 45

slide-18
SLIDE 18

NFC on Mobile Phones

NFC extends RFID:

1

Phones can act as readers

2

Phones can emulate tags

3

Phones can communicate peer-to-peer

Background NFC on Mobile Phones 10 / 45

slide-19
SLIDE 19

NFC on Mobile Phones

1 Phones can act as readers

  • Phones read NFC tags as if they were QR codes
  • Touching a tag mounted to a map could bring up

tourist information

  • Research into using tags as a user interface

Background NFC on Mobile Phones 11 / 45 Image from Hardy 2010

slide-20
SLIDE 20

NFC on Mobile Phones

1 Phones can act as readers

  • Phones read NFC tags as if they were QR codes
  • Touching a tag mounted to a map could bring up

tourist information

  • Research into using tags as a user interface

Background NFC on Mobile Phones 11 / 45 Image from Hardy 2010

slide-21
SLIDE 21

NFC on Mobile Phones

1 Phones can act as readers

  • Phones read NFC tags as if they were QR codes
  • Touching a tag mounted to a map could bring up

tourist information

  • Research into using tags as a user interface

Background NFC on Mobile Phones 11 / 45 Image from Hardy 2010

slide-22
SLIDE 22

NFC on Mobile Phones

2 Phones can emulate tags

  • Phones acts as if it were a passive tag
  • A possibility for payments or ticketing applications

Background NFC on Mobile Phones 12 / 45 Image Note: Thank you Evan

slide-23
SLIDE 23

NFC on Mobile Phones

2 Phones can emulate tags

  • Phones acts as if it were a passive tag
  • A possibility for payments or ticketing applications

Background NFC on Mobile Phones 12 / 45 Image Note: Thank you Evan

slide-24
SLIDE 24

Phones can communicate peer-to-peer

3 Phones can communicate as peers

  • Phones take turns switching between reader and

tag-emulation mode

  • Highest NFC communication throughput
  • Can be used as a basis for stronger security or fjle

transfers

Background NFC on Mobile Phones 13 / 45 Image Note: Thank you Jacob and Maggie

slide-25
SLIDE 25

Phones can communicate peer-to-peer

3 Phones can communicate as peers

  • Phones take turns switching between reader and

tag-emulation mode

  • Highest NFC communication throughput
  • Can be used as a basis for stronger security or fjle

transfers

Background NFC on Mobile Phones 13 / 45 Image Note: Thank you Jacob and Maggie

slide-26
SLIDE 26

Phones can communicate peer-to-peer

3 Phones can communicate as peers

  • Phones take turns switching between reader and

tag-emulation mode

  • Highest NFC communication throughput
  • Can be used as a basis for stronger security or fjle

transfers

Background NFC on Mobile Phones 13 / 45 Image Note: Thank you Jacob and Maggie

slide-27
SLIDE 27

Security for NFC

NFC is not inherently secure

1

NFC’s limited range makes attacks diffjcult, but not impossible

2

Features like confjdentiality, integrity, and authentication need to be implemented as an extension of NFC

Background Security for NFC 14 / 45

slide-28
SLIDE 28

Contactless Credit Cards

Background Contactless Credit Cards Current Credit Card Protocol Credit Card Attacks Proposed Secure Credit Card Protocol NFC and Mass Transit Ticketing EnGarde: Physical NFC Security Conclusion

Contactless Credit Cards Current Credit Card Protocol 15 / 45

slide-29
SLIDE 29

Contactless Credit Cards

Contactless Credit Cards

  • Some credit cards contain passive NFC tags
  • We focus on Jensen, Gouda, and Qiu’s [1] work on securing such cards

in this section

  • Security solutions must be computationally inexpensive to run on

passive tags

Contactless Credit Cards Current Credit Card Protocol 16 / 45

slide-30
SLIDE 30

Contactless Credit Cards

Contactless Credit Cards

  • Some credit cards contain passive NFC tags
  • We focus on Jensen, Gouda, and Qiu’s [1] work on securing such cards

in this section

  • Security solutions must be computationally inexpensive to run on

passive tags

Contactless Credit Cards Current Credit Card Protocol 16 / 45

slide-31
SLIDE 31

Contactless Credit Cards

Contactless Credit Cards

  • Some credit cards contain passive NFC tags
  • We focus on Jensen, Gouda, and Qiu’s [1] work on securing such cards

in this section

  • Security solutions must be computationally inexpensive to run on

passive tags

Contactless Credit Cards Current Credit Card Protocol 16 / 45

slide-32
SLIDE 32

Contactless Credit Cards

  • Card generates a

pseudo-random Dynamic Card Validation Value (iCVV) for each transaction

  • The iCVV is sent to point of sale

and then validated by bank

Contactless Credit Cards Current Credit Card Protocol 17 / 45

slide-33
SLIDE 33

Current Credit Protocol

Security depends upon

  • Each transaction’s card generated iCVV
  • The limited range of NFC

Contactless Credit Cards Current Credit Card Protocol 18 / 45

slide-34
SLIDE 34

Current Credit Protocol

Solicitation

  • Point of Sale and Credit card exchange static

messages

  • For example, card may identify itself as VISA CREDIT

Contactless Credit Cards Current Credit Card Protocol 18 / 45

slide-35
SLIDE 35

Current Credit Protocol

Card Information

  • Credit card transmits card information, including:

card number, expiration, bank name, and iCVV

  • Unfortunately, this transmission is in plain text

Contactless Credit Cards Current Credit Card Protocol 18 / 45

slide-36
SLIDE 36

Current Credit Protocol

Charge request

  • Card number, expiration, and iCVV are sent to the

indicated bank

Contactless Credit Cards Current Credit Card Protocol 18 / 45

slide-37
SLIDE 37

Current Credit Protocol

Authorization

  • Bank verifjes transaction by checking iCVV, location

information, and other bank information

Contactless Credit Cards Current Credit Card Protocol 18 / 45

slide-38
SLIDE 38

Eavesdropping

Eavesdropping

  • A third party captures sensitive information sent

between Point of Sale and Credit Card

  • Card number, expiration, bank name, and used iCVV

can be obtained

Contactless Credit Cards Credit Card Attacks 19 / 45 Photo of eavesdropper from Flicker

slide-39
SLIDE 39

Eavesdropping

Eavesdropping

  • A third party captures sensitive information sent

between Point of Sale and Credit Card

  • Card number, expiration, bank name, and used iCVV

can be obtained

Contactless Credit Cards Credit Card Attacks 19 / 45 Photo of eavesdropper from Flicker

slide-40
SLIDE 40

Eavesdropping

Eavesdropping

  • A third party captures sensitive information sent

between Point of Sale and Credit Card

  • Card number, expiration, bank name, and used iCVV

can be obtained

Contactless Credit Cards Credit Card Attacks 19 / 45 Photo of eavesdropper from Flicker

slide-41
SLIDE 41

Eavesdropping

The eavesdropping attack is feasible, requiring only an inex- pensive tag and radio

  • A small antenna could easily be concealed near a

terminal

Contactless Credit Cards Credit Card Attacks 20 / 45

slide-42
SLIDE 42

Eavesdropping

The eavesdropping attack is feasible, requiring only an inex- pensive tag and radio

  • A small antenna could easily be concealed near a

terminal

Contactless Credit Cards Credit Card Attacks 20 / 45

slide-43
SLIDE 43

Skimming & Relay Attacks

The attacker masquerades as a card reader

  • An unused iCVV can be skimmed from the card
  • Then, a fraudulent purchase can occur at a real point of sale
  • In a relay attack, two devices execute the skimming attack in

concert

Contactless Credit Cards Credit Card Attacks 21 / 45

slide-44
SLIDE 44

Skimming & Relay Attacks

The attacker masquerades as a card reader

  • An unused iCVV can be skimmed from the card
  • Then, a fraudulent purchase can occur at a real point of sale
  • In a relay attack, two devices execute the skimming attack in

concert

Contactless Credit Cards Credit Card Attacks 21 / 45

slide-45
SLIDE 45

Skimming & Relay Attacks

The attacker masquerades as a card reader

  • An unused iCVV can be skimmed from the card
  • Then, a fraudulent purchase can occur at a real point of sale
  • In a relay attack, two devices execute the skimming attack in

concert

Contactless Credit Cards Credit Card Attacks 21 / 45

slide-46
SLIDE 46

Skimming & Relay Attacks

The attacker masquerades as a card reader

  • An unused iCVV can be skimmed from the card
  • Then, a fraudulent purchase can occur at a real point of sale
  • In a relay attack, two devices execute the skimming attack in

concert

Contactless Credit Cards Credit Card Attacks 21 / 45

slide-47
SLIDE 47

Skimming & Relay Attacks

The attacker masquerades as a card reader

  • An unused iCVV can be skimmed from the card
  • Then, a fraudulent purchase can occur at a real point of sale
  • In a relay attack, two devices execute the skimming attack in

concert

Contactless Credit Cards Credit Card Attacks 21 / 45

slide-48
SLIDE 48

Proposed Secure Credit Protocol

A credit card protocol restructured

Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45

slide-49
SLIDE 49

Proposed Secure Credit Protocol

Solicitation

  • Point of Sale now sends a challenge

Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45

slide-50
SLIDE 50

Proposed Secure Credit Protocol

Restructured Card Information

A UUID, a static Universally Unique Identifjer is used to identify the credit card. B H(card info, ch, iCVV) is a hash-like function used to authenticate the card’s identity. C bank name is used to route the charge request.

Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45

slide-51
SLIDE 51

Proposed Secure Credit Protocol

Charge request

  • Card information is sent to the indicated bank

Authorization

  • Bank verifjes transaction

Contactless Credit Cards Proposed Secure Credit Card Protocol 22 / 45

slide-52
SLIDE 52

Hash-like function H

Requirements of H

1

Output appears random

2

Output cannot be used to derive components

So that attackers cannot

  • Glean useful information
  • Build a new hash output using the components and a new

challenge

Contactless Credit Cards Proposed Secure Credit Card Protocol 23 / 45

slide-53
SLIDE 53

Hash-like function H

Requirements of H

1

Output appears random

2

Output cannot be used to derive components

Contactless Credit Cards Proposed Secure Credit Card Protocol 23 / 45

slide-54
SLIDE 54

Hash-like function H

Requirements of H

1

Output appears random

2

Output cannot be used to derive components

Contactless Credit Cards Proposed Secure Credit Card Protocol 23 / 45

slide-55
SLIDE 55

NFC and Mass Transit Ticketing

Background Contactless Credit Cards NFC and Mass Transit Ticketing Ticketing Protocols Viability of Mobile Ticketing EnGarde: Physical NFC Security Conclusion

NFC and Mass Transit Ticketing 24 / 45

slide-56
SLIDE 56

NFC and Mass Transit Ticketing

NFC and Mass Transit Ticketing

  • Presently, contactless cards widely used for mass transit ticketing
  • Three Nokia reseachers investigate NFC phone based ticketing
  • Tamrakar, Ekberg, and Asokan’s [2] work is the focus of this section
  • Their goal is to build a secure ticketing scheme while keeping

transaction time below the 300ms industry standard

NFC and Mass Transit Ticketing 25 / 45

slide-57
SLIDE 57

NFC and Mass Transit Ticketing

NFC and Mass Transit Ticketing

  • Presently, contactless cards widely used for mass transit ticketing
  • Three Nokia reseachers investigate NFC phone based ticketing
  • Tamrakar, Ekberg, and Asokan’s [2] work is the focus of this section
  • Their goal is to build a secure ticketing scheme while keeping

transaction time below the 300ms industry standard

NFC and Mass Transit Ticketing 25 / 45

slide-58
SLIDE 58

NFC and Mass Transit Ticketing

NFC and Mass Transit Ticketing

  • Presently, contactless cards widely used for mass transit ticketing
  • Three Nokia reseachers investigate NFC phone based ticketing
  • Tamrakar, Ekberg, and Asokan’s [2] work is the focus of this section
  • Their goal is to build a secure ticketing scheme while keeping

transaction time below the 300ms industry standard

NFC and Mass Transit Ticketing 25 / 45

slide-59
SLIDE 59

NFC and Mass Transit Ticketing

NFC and Mass Transit Ticketing

  • Presently, contactless cards widely used for mass transit ticketing
  • Three Nokia reseachers investigate NFC phone based ticketing
  • Tamrakar, Ekberg, and Asokan’s [2] work is the focus of this section
  • Their goal is to build a secure ticketing scheme while keeping

transaction time below the 300ms industry standard

NFC and Mass Transit Ticketing 25 / 45

slide-60
SLIDE 60

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-61
SLIDE 61

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-62
SLIDE 62

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-63
SLIDE 63

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-64
SLIDE 64

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-65
SLIDE 65

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-66
SLIDE 66

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-67
SLIDE 67

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-68
SLIDE 68

Proposed Ticketing Protocol

NFC and Mass Transit Ticketing Ticketing Protocols 26 / 45

slide-69
SLIDE 69

Protocol Variant 1

Use a lighter authentication method

  • Switching from a signature to a MAC (message authentication code)

substantially reduces overhead

Use tokens instead of certifjcates

  • Send a small token that the reader can validate
  • For security, the token should be refreshed often

NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45

slide-70
SLIDE 70

Protocol Variant 1

Use a lighter authentication method

  • Switching from a signature to a MAC (message authentication code)

substantially reduces overhead

Use tokens instead of certifjcates

  • Send a small token that the reader can validate
  • For security, the token should be refreshed often

NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45

slide-71
SLIDE 71

Protocol Variant 1

Use a lighter authentication method

  • Switching from a signature to a MAC (message authentication code)

substantially reduces overhead

Use tokens instead of certifjcates

  • Send a small token that the reader can validate
  • For security, the token should be refreshed often

NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45

slide-72
SLIDE 72

Protocol Variant 1

Use a lighter authentication method

  • Switching from a signature to a MAC (message authentication code)

substantially reduces overhead

Use tokens instead of certifjcates

  • Send a small token that the reader can validate
  • For security, the token should be refreshed often

NFC and Mass Transit Ticketing Ticketing Protocols 27 / 45

slide-73
SLIDE 73

Protocol Variant 1

NFC and Mass Transit Ticketing Ticketing Protocols 28 / 45

slide-74
SLIDE 74

Protocol Variant 1

NFC and Mass Transit Ticketing Ticketing Protocols 28 / 45

slide-75
SLIDE 75

Protocol Variant 1

NFC and Mass Transit Ticketing Ticketing Protocols 28 / 45

slide-76
SLIDE 76

Protocol Variant 2

Use small, timely tokens AND a long-term certifjcate

  • This is implemented using a reverse hash chain

NFC and Mass Transit Ticketing Ticketing Protocols 29 / 45

slide-77
SLIDE 77

Protocol Variant 2

Use small, timely tokens AND a long-term certifjcate

  • This is implemented using a reverse hash chain

NFC and Mass Transit Ticketing Ticketing Protocols 29 / 45

slide-78
SLIDE 78

Viability of Mobile Ticketing

Viability of Proposed Protocols

Encryption Key Size Standard Variant 1 Variant 2 1024 bits 296 ms 164 ms 182 ms 1152 bits 314 ms 172 ms 190 ms 2048 bits 482 ms 228 ms 246 ms

  • NFC transfer speeds were the biggest bottleneck
  • The authors noted that smaller two key sizes have been deprecated in

the payment industry

  • The industry recommended transaction time is 300ms. After taking

this into account, only two options are viable

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45

slide-79
SLIDE 79

Viability of Mobile Ticketing

Viability of Proposed Protocols

Encryption Key Size Standard Variant 1 Variant 2 1024 bits 296 ms 164 ms 182 ms 1152 bits 314 ms 172 ms 190 ms 2048 bits 482 ms 228 ms 246 ms

  • NFC transfer speeds were the biggest bottleneck
  • The authors noted that smaller two key sizes have been deprecated in

the payment industry

  • The industry recommended transaction time is 300ms. After taking

this into account, only two options are viable

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45

slide-80
SLIDE 80

Viability of Mobile Ticketing

Viability of Proposed Protocols

Encryption Key Size Standard Variant 1 Variant 2 1024 bits 296 ms 164 ms 182 ms 1152 bits 314 ms 172 ms 190 ms 2048 bits 482 ms 228 ms 246 ms

  • NFC transfer speeds were the biggest bottleneck
  • The authors noted that smaller two key sizes have been deprecated in

the payment industry

  • The industry recommended transaction time is 300ms. After taking

this into account, only two options are viable

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45

slide-81
SLIDE 81

Viability of Mobile Ticketing

Viability of Proposed Protocols

Encryption Key Size Standard Variant 1 Variant 2 1024 bits 296 ms 164 ms 182 ms 1152 bits 314 ms 172 ms 190 ms 2048 bits 482 ms 228 ms 246 ms

  • NFC transfer speeds were the biggest bottleneck
  • The authors noted that smaller two key sizes have been deprecated in

the payment industry

  • The industry recommended transaction time is 300ms. After taking

this into account, only two options are viable

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45

slide-82
SLIDE 82

Viability of Mobile Ticketing

Viability of Proposed Protocols

Encryption Key Size Standard Variant 1 Variant 2 1024 bits 296 ms 164 ms 182 ms 1152 bits 314 ms 172 ms 190 ms 2048 bits 482 ms 228 ms 246 ms

  • NFC transfer speeds were the biggest bottleneck
  • The authors noted that smaller two key sizes have been deprecated in

the payment industry

  • The industry recommended transaction time is 300ms. After taking

this into account, only two options are viable

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45

slide-83
SLIDE 83

Viability of Mobile Ticketing

Viability of Proposed Protocols

Encryption Key Size Standard Variant 1 Variant 2 1024 bits 296 ms 164 ms 182 ms 1152 bits 314 ms 172 ms 190 ms 2048 bits 482 ms 228 ms 246 ms

  • NFC transfer speeds were the biggest bottleneck
  • The authors noted that smaller two key sizes have been deprecated in

the payment industry

  • The industry recommended transaction time is 300ms. After taking

this into account, only two options are viable

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 30 / 45

slide-84
SLIDE 84

Viability of Mobile Ticketing

Viability of Mobile Ticketing

  • Using mobile ticketing ofgers convince and a richer user interface
  • The Nokia researchers grant that relay attacks are possible in all

protocols, but that there is a short opportunity windows and low monetary gain

  • The researchers state that these protocols are meets performance

and security needs better than the current contactless card system

  • While mobile ticketing is an imperfect, it is valid path forward that
  • fgers value

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45

slide-85
SLIDE 85

Viability of Mobile Ticketing

Viability of Mobile Ticketing

  • Using mobile ticketing ofgers convince and a richer user interface
  • The Nokia researchers grant that relay attacks are possible in all

protocols, but that there is a short opportunity windows and low monetary gain

  • The researchers state that these protocols are meets performance

and security needs better than the current contactless card system

  • While mobile ticketing is an imperfect, it is valid path forward that
  • fgers value

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45

slide-86
SLIDE 86

Viability of Mobile Ticketing

Viability of Mobile Ticketing

  • Using mobile ticketing ofgers convince and a richer user interface
  • The Nokia researchers grant that relay attacks are possible in all

protocols, but that there is a short opportunity windows and low monetary gain

  • The researchers state that these protocols are meets performance

and security needs better than the current contactless card system

  • While mobile ticketing is an imperfect, it is valid path forward that
  • fgers value

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45

slide-87
SLIDE 87

Viability of Mobile Ticketing

Viability of Mobile Ticketing

  • Using mobile ticketing ofgers convince and a richer user interface
  • The Nokia researchers grant that relay attacks are possible in all

protocols, but that there is a short opportunity windows and low monetary gain

  • The researchers state that these protocols are meets performance

and security needs better than the current contactless card system

  • While mobile ticketing is an imperfect, it is valid path forward that
  • fgers value

NFC and Mass Transit Ticketing Viability of Mobile Ticketing 31 / 45

slide-88
SLIDE 88

EnGarde: Physical NFC Security

Background Contactless Credit Cards NFC and Mass Transit Ticketing EnGarde: Physical NFC Security The Engarde Protoype NFC Decoding and Jamming Experimental Evaluation Conclusion

EnGarde: Physical NFC Security 32 / 45

slide-89
SLIDE 89

EnGarde: Physical NFC Security

EnGarde: Physical NFC Security

  • Commercial payments systems are bringing NFC to phones
  • As a result, there may be new risks in both payment and non-payment

applications of NFC

  • EnGarde is a semi-permanent phone attachment, designed to act as a

hardware-based fjrewall

  • Gummeson et al’s [3] work on the EnGarde prototype is the focus of

this section

EnGarde: Physical NFC Security 33 / 45

slide-90
SLIDE 90

EnGarde: Physical NFC Security

EnGarde: Physical NFC Security

  • Commercial payments systems are bringing NFC to phones
  • As a result, there may be new risks in both payment and non-payment

applications of NFC

  • EnGarde is a semi-permanent phone attachment, designed to act as a

hardware-based fjrewall

  • Gummeson et al’s [3] work on the EnGarde prototype is the focus of

this section

EnGarde: Physical NFC Security 33 / 45

slide-91
SLIDE 91

EnGarde: Physical NFC Security

EnGarde: Physical NFC Security

  • Commercial payments systems are bringing NFC to phones
  • As a result, there may be new risks in both payment and non-payment

applications of NFC

  • EnGarde is a semi-permanent phone attachment, designed to act as a

hardware-based fjrewall

  • Gummeson et al’s [3] work on the EnGarde prototype is the focus of

this section

EnGarde: Physical NFC Security 33 / 45

slide-92
SLIDE 92

EnGarde: Physical NFC Security

EnGarde: Physical NFC Security

  • Commercial payments systems are bringing NFC to phones
  • As a result, there may be new risks in both payment and non-payment

applications of NFC

  • EnGarde is a semi-permanent phone attachment, designed to act as a

hardware-based fjrewall

  • Gummeson et al’s [3] work on the EnGarde prototype is the focus of

this section

EnGarde: Physical NFC Security 33 / 45

slide-93
SLIDE 93

EnGarde Prototype

EnGarde Prototype Features

  • Small form factor for semi-permanent mounting to a mobile phone
  • Independent battery, memory, and processor from phone
  • Software can be updated to combat current and future threats

EnGarde: Physical NFC Security The Engarde Protoype 34 / 45

slide-94
SLIDE 94

EnGarde Prototype

EnGarde Prototype Features

  • Small form factor for semi-permanent mounting to a mobile phone
  • Independent battery, memory, and processor from phone
  • Software can be updated to combat current and future threats

EnGarde: Physical NFC Security The Engarde Protoype 34 / 45

slide-95
SLIDE 95

EnGarde Prototype

EnGarde Prototype Features

  • Small form factor for semi-permanent mounting to a mobile phone
  • Independent battery, memory, and processor from phone
  • Software can be updated to combat current and future threats

EnGarde: Physical NFC Security The Engarde Protoype 34 / 45

slide-96
SLIDE 96

EnGarde Prototype

EnGarde Prototype Features

  • Small form factor for semi-permanent mounting to a mobile phone
  • Independent battery, memory, and processor from phone
  • Software can be updated to combat current and future threats

EnGarde: Physical NFC Security The Engarde Protoype 34 / 45

slide-97
SLIDE 97

EnGarde Prototype

EnGarde Prototype Features

  • Small form factor for semi-permanent mounting to a mobile phone
  • Independent battery, memory, and processor from phone
  • Software can be updated to combat current and future threats

EnGarde: Physical NFC Security The Engarde Protoype 34 / 45

slide-98
SLIDE 98

EnGarde Expectations

EnGarde should defend against all NFC modes

  • Malicious tags
  • Malicious readers
  • Malicious peers
  • Malicious software installations

EnGarde: Physical NFC Security The Engarde Protoype 35 / 45

slide-99
SLIDE 99

NFC Decoding and Jamming

How does EnGarde detect and stop unwanted transmissions?

EnGarde: Physical NFC Security NFC Decoding and Jamming 36 / 45

slide-100
SLIDE 100

NFC Decoding and Jamming

How does EnGarde detect and stop unwanted transmissions?

EnGarde: Physical NFC Security NFC Decoding and Jamming 36 / 45

slide-101
SLIDE 101

NFC Decoding

NFC Decoder

  • When there is an incoming or outgoing transmission, EnGarde will

listen in

  • EnGarde scans transmissions and determines if they are worthy using

a set of blocking rules

  • The blocking rules can be updated for robust handling of current and

future attacks

EnGarde: Physical NFC Security NFC Decoding and Jamming 37 / 45

slide-102
SLIDE 102

NFC Decoding

NFC Decoder

  • When there is an incoming or outgoing transmission, EnGarde will

listen in

  • EnGarde scans transmissions and determines if they are worthy using

a set of blocking rules

  • The blocking rules can be updated for robust handling of current and

future attacks

EnGarde: Physical NFC Security NFC Decoding and Jamming 37 / 45

slide-103
SLIDE 103

NFC Decoding

NFC Decoder

  • When there is an incoming or outgoing transmission, EnGarde will

listen in

  • EnGarde scans transmissions and determines if they are worthy using

a set of blocking rules

  • The blocking rules can be updated for robust handling of current and

future attacks

EnGarde: Physical NFC Security NFC Decoding and Jamming 37 / 45

slide-104
SLIDE 104

Jamming Communications

Refmective Jamming

  • This jamming method is used against low-powered tags
  • By broadcasting on the same frequency, EnGarde can block out

messages from malicious tags

  • The fjeld the phone is using to activate the tags also powers EnGarde’s

defense

EnGarde: Physical NFC Security NFC Decoding and Jamming 38 / 45

slide-105
SLIDE 105

Jamming Communications

Refmective Jamming

  • This jamming method is used against low-powered tags
  • By broadcasting on the same frequency, EnGarde can block out

messages from malicious tags

  • The fjeld the phone is using to activate the tags also powers EnGarde’s

defense

EnGarde: Physical NFC Security NFC Decoding and Jamming 38 / 45

slide-106
SLIDE 106

Jamming Communications

Refmective Jamming

  • This jamming method is used against low-powered tags
  • By broadcasting on the same frequency, EnGarde can block out

messages from malicious tags

  • The fjeld the phone is using to activate the tags also powers EnGarde’s

defense

EnGarde: Physical NFC Security NFC Decoding and Jamming 38 / 45

slide-107
SLIDE 107

Jamming Communications

Pulse Jamming

  • This jamming method is used against high-powered readers or peers
  • Since a reader is sourcing a considerable amount of power, Engarde

can only corrupt rather than completely block messages

  • The fjeld from the reader sustains EnGarde’s defense

EnGarde: Physical NFC Security NFC Decoding and Jamming 39 / 45

slide-108
SLIDE 108

Jamming Communications

Pulse Jamming

  • This jamming method is used against high-powered readers or peers
  • Since a reader is sourcing a considerable amount of power, Engarde

can only corrupt rather than completely block messages

  • The fjeld from the reader sustains EnGarde’s defense

EnGarde: Physical NFC Security NFC Decoding and Jamming 39 / 45

slide-109
SLIDE 109

Jamming Communications

Pulse Jamming

  • This jamming method is used against high-powered readers or peers
  • Since a reader is sourcing a considerable amount of power, Engarde

can only corrupt rather than completely block messages

  • The fjeld from the reader sustains EnGarde’s defense

EnGarde: Physical NFC Security NFC Decoding and Jamming 39 / 45

slide-110
SLIDE 110

Experimental Evaluation of EnGarde

Results

  • EnGarde was able to successfully block all malicious test cases using
  • ne of the jamming methods
  • Decoding was also successful in decoding a malicious tag to the URL

http://www.malware

  • EnGarde’s defense seems strong, but we note that its defense is only

as strong as the blocking rules it has

EnGarde: Physical NFC Security Experimental Evaluation 40 / 45

slide-111
SLIDE 111

Experimental Evaluation of EnGarde

Results

  • EnGarde was able to successfully block all malicious test cases using
  • ne of the jamming methods
  • Decoding was also successful in decoding a malicious tag to the URL

http://www.malware

  • EnGarde’s defense seems strong, but we note that its defense is only

as strong as the blocking rules it has

EnGarde: Physical NFC Security Experimental Evaluation 40 / 45

slide-112
SLIDE 112

Experimental Evaluation of EnGarde

Results

  • EnGarde was able to successfully block all malicious test cases using
  • ne of the jamming methods
  • Decoding was also successful in decoding a malicious tag to the URL

http://www.malware

  • EnGarde’s defense seems strong, but we note that its defense is only

as strong as the blocking rules it has

EnGarde: Physical NFC Security Experimental Evaluation 40 / 45

slide-113
SLIDE 113

Conclusion

Background Contactless Credit Cards NFC and Mass Transit Ticketing EnGarde: Physical NFC Security Conclusion

Conclusion 41 / 45

slide-114
SLIDE 114

Conclusion

Conclusion

  • Now we have a better idea of how NFC works. Is it secure? Is it the

future?

  • Clever solutions can mitigate security concerns
  • NFC data transfer speed appears to be the biggest bottleneck
  • NFC is young and will likely act as platform for future applications
  • In the end, security relies on vigilance and on understanding risks

Conclusion 42 / 45

slide-115
SLIDE 115

Conclusion

Conclusion

  • Now we have a better idea of how NFC works. Is it secure? Is it the

future?

  • Clever solutions can mitigate security concerns
  • NFC data transfer speed appears to be the biggest bottleneck
  • NFC is young and will likely act as platform for future applications
  • In the end, security relies on vigilance and on understanding risks

Conclusion 42 / 45

slide-116
SLIDE 116

Conclusion

Conclusion

  • Now we have a better idea of how NFC works. Is it secure? Is it the

future?

  • Clever solutions can mitigate security concerns
  • NFC data transfer speed appears to be the biggest bottleneck
  • NFC is young and will likely act as platform for future applications
  • In the end, security relies on vigilance and on understanding risks

Conclusion 42 / 45

slide-117
SLIDE 117

Conclusion

Conclusion

  • Now we have a better idea of how NFC works. Is it secure? Is it the

future?

  • Clever solutions can mitigate security concerns
  • NFC data transfer speed appears to be the biggest bottleneck
  • NFC is young and will likely act as platform for future applications
  • In the end, security relies on vigilance and on understanding risks

Conclusion 42 / 45

slide-118
SLIDE 118

Conclusion

Conclusion

  • Now we have a better idea of how NFC works. Is it secure? Is it the

future?

  • Clever solutions can mitigate security concerns
  • NFC data transfer speed appears to be the biggest bottleneck
  • NFC is young and will likely act as platform for future applications
  • In the end, security relies on vigilance and on understanding risks

Conclusion 42 / 45

slide-119
SLIDE 119

Questions

Questions?

Stop by the NFC enabled pop machine near the bookstore for a neat demonstration.

Conclusion 43 / 45

slide-120
SLIDE 120

Sources

Primary Research Sources

1

Oliver Jensen, Mohamed Gouda, and Lili Qiu. 2016. A secure credit card protocol over NFC. In Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN ’16). ACM, New York, NY, USA, Article 32 , 9 pages.

2

Sandeep Tamrakar, Jan-Erik Ekberg, and N. Asokan. 2011. Identity verifjcation schemes for public transport ticketing with NFC phones. In Proceedings of the sixth ACM workshop on Scalable trusted computing (STC ’11). ACM, New York, NY, USA, 37-48.

3

Jeremy J. Gummeson, Bodhi Priyantha, Deepak Ganesan, Derek Thrasher, and Pengyu Zhang. 2013. EnGarde: protecting the mobile phone from malicious NFC interactions. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services (MobiSys ’13). ACM, New York, NY, USA, 445-458.

Conclusion 44 / 45

slide-121
SLIDE 121

Sources

Additional Sources

  • Personal photos
  • Wikipedia Articles: Near Field Communication, Radio-frequency identifjcation,

Card Security Code, Intermodal Container

  • Robert Hardy, Enrico Rukzio, Paul Holleis, and Matthias Wagner. 2010. Mobile

interaction with static and dynamic NFC-based displays. In Proceedings of the 12th international conference on Human computer interaction with mobile devices and services (MobileHCI ’10). ACM, New York, NY, USA, 123-132.

Conclusion 45 / 45