skip to main content
10.1145/3579856.3596440acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
keynote

Formal Methods for Payment Protocols

Published:10 July 2023Publication History

ABSTRACT

We report on experience using Tamarin, a security protocol model checker, to find numerous, serious exploitable vulnerabilities in EMV payment protocols. EMV is the international protocol standard for smartcard payment that is used in over 9 billion payment cards worldwide. Despite the standard’s advertised security, various issues have been previously uncovered, deriving from logical flaws that are hard to spot in EMV’s lengthy and complex specification, running over 2,000 pages.

We have formalized a comprehensive model of EMV in Tamarin. We use our model to automatically discover new flaws that lead to critical attacks on EMV. In particular, an attacker can use a victim’s EMV card (e.g., Mastercard or Visa Card) for high-valued purchases without the victim’s PIN. We describe these attacks, their repair, and more generally why using formal methods is essential for critical protocols like payment protocols.

References

  1. David Basin, Cas Cremers, and Catherine Meadows. 2018. Model Checking Security Protocols. Springer, Chapter 24, 727–762.Google ScholarGoogle Scholar
  2. David A. Basin, Cas J. F. Cremers, Kunihiko Miyazaki, Sasa Radomirovic, and Dai Watanabe. 2015. Improving the Security of Cryptographic Protocol Standards. IEEE Security & Privacy 13, 3 (2015), 24–31. https://doi.org/10.1109/MSP.2013.162Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David A. Basin, Ralf Sasse, and Jorge Toro-Pozo. 2021. Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 179–194. https://www.usenix.org/conference/usenixsecurity21/presentation/basinGoogle ScholarGoogle Scholar
  4. David A. Basin, Ralf Sasse, and Jorge Toro-Pozo. 2021. The EMV Standard: Break, Fix, Verify. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021. IEEE, 1766–1781. https://doi.org/10.1109/SP40001.2021.00037Google ScholarGoogle ScholarCross RefCross Ref
  5. Jannik Dreier David Basin, Cas Cremers and Ralf Sasse. 2017. Symbolically Analyzing Security Protocols using TAMARIN. SIGLOG News 4, 4 (October 2017), 19–30. https://doi.org/10.1145/3157831.3157835Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Patrick Schaller David Basin and Jorge Toro-Pozo. 2023. Inducing Authentication Failures to Bypass Credit Card PINs. In 32th USENIX Security Symposium, USENIX Security 2023. USENIX Association. To appear.Google ScholarGoogle Scholar
  7. Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, and David Basin. 2020. A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association, 1857–1874.Google ScholarGoogle Scholar

Index Terms

  1. Formal Methods for Payment Protocols

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security
      July 2023
      1066 pages
      ISBN:9798400700989
      DOI:10.1145/3579856

      Copyright © 2023 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 July 2023

      Check for updates

      Qualifiers

      • keynote
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate418of2,322submissions,18%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format