TY - GEN
T1 - Practical attack scenarios on secure element-enabled mobile devices
AU - Roland, Michael
AU - Langer, Josef
AU - Scharinger, Josef
N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - Near Field Communication's card emulation mode is a way to put virtual smartcards into mobile phones. A recently launched application is Google Wallet. Google Wallet turns a phone into a credit card, a prepaid card and a tool to collect gift certificates and discounts. Card emulation mode uses dedicated smartcard chips, which are considered to fulfill high security standards. Therefore, card emulation mode is also considered to be safe and secure. However, an NFC-enabled mobile phone introduces a significantly different threat vector. Especially a mobile phone's permanent connectivity to a global network and the possibility to install arbitrary applications onto smart phones open up for several new attack scenarios. This paper gives an overview of the new risks imposed by mobile connectivity and untrusted mobile phone applications. The various APIs for secure element access on different mobile phone platforms and their access control mechanisms are analyzed. The security aspects of mobile phones are explained. Finally, two practical attack scenarios, a method to perform a denial of service (DoS) attack against a secure element and a method to remotely use the applications on a victims secure element without the victim's knowledge, are highlighted.
AB - Near Field Communication's card emulation mode is a way to put virtual smartcards into mobile phones. A recently launched application is Google Wallet. Google Wallet turns a phone into a credit card, a prepaid card and a tool to collect gift certificates and discounts. Card emulation mode uses dedicated smartcard chips, which are considered to fulfill high security standards. Therefore, card emulation mode is also considered to be safe and secure. However, an NFC-enabled mobile phone introduces a significantly different threat vector. Especially a mobile phone's permanent connectivity to a global network and the possibility to install arbitrary applications onto smart phones open up for several new attack scenarios. This paper gives an overview of the new risks imposed by mobile connectivity and untrusted mobile phone applications. The various APIs for secure element access on different mobile phone platforms and their access control mechanisms are analyzed. The security aspects of mobile phones are explained. Finally, two practical attack scenarios, a method to perform a denial of service (DoS) attack against a secure element and a method to remotely use the applications on a victims secure element without the victim's knowledge, are highlighted.
KW - Near Field Communication (NFC)
KW - Security
KW - Relay Attack
KW - Denial of Service (DoS)
KW - Near Field Communication (NFC)
KW - Security
KW - Relay Attack
KW - Denial of Service (DoS)
UR - http://www.scopus.com/inward/record.url?scp=84860527305&partnerID=8YFLogxK
U2 - 10.1109/NFC.2012.10
DO - 10.1109/NFC.2012.10
M3 - Conference contribution
SN - 9780769546780
T3 - Proceedings - 4th International Workshop on Near Field Communication, NFC 2012
SP - 19
EP - 24
BT - Proceedings - 4th International Workshop on Near Field Communication, NFC 2012
PB - IEEE Computer Society’s Conference Publishing Services
T2 - 4th International Research Workshop on Near Field Communication, NFC 2012
Y2 - 13 March 2012 through 13 March 2012
ER -