Typical Attack Techniques for Compromising Point of Sale PIN Entry Devices Physical Security Testing Workshop Steven Bowles, Project Manager Payment Assurance.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Troy Leach April 2012 The PCI Security Standards Council.
Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
FIPS Section 5 – Physical Security Randall J. Easter Director, NIST CMVP Ken Lu CSE CMVP September 28, 2005.
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
One Way Circuits Limited Printed Circuit Board Manufacturer A Guide To Manufacturing Multilayer PCBs Use Left and Right Cursor keys to navigate ESC to.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Security Controls – What Works
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
POS/ATM Protection Profile for a Common European Banking Industry Approval Scheme Common Approval Scheme POI Working Group SRC Security Research & Consulting.
1 An Overview of Computer Security computer security.
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Introducing Computer and Network Security
FIT3105 Security and Identity Management Lecture 1.
Iron Key and Portable Drive Security Zakary Littlefield.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Controls for Information Security
Why Comply with PCI Security Standards?
PCI PIN Entry Device Security Requirements PCI PIN Security Standards
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Introduction to Network Defense
1Copyright © 2005 InfoGard Laboratories Proprietary NIST CMVP Physical Security Conference Physical Security Protections September 25, 2005.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Storage Security and Management: Security Framework
Information Systems Security Computer System Life Cycle Security.
Chapter 4.  Can technology alone provide the best security for your organization?
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
What does “secure” mean? Protecting Valuables
Setting up the Ricoh C305 Press F5 to start the Presentation
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Smart Card Technology & Features
Network security Network security. Look at the surroundings before you leap.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
G53SEC 1 Reference Monitors Enforcement of Access Control.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Chap1: Is there a Security Problem in Computing?.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
Moscow, 2009 ACCORD-THSM Accord. Reliability in an unreliable world. OKB SAPR Special Design Bureau for CAD System Design
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Tamper Resistant Software: An Implementation By David Aucsmith, IAL In Information Hiding Workshop, RJ Anderson (ed), LNCS, 1174, pp , “Integrity.
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Payment Card Industry (PCI) Rules and Standards
Security of Digital Signatures
Fraud Prevention Solutions Make it secure, keep it simple!
Gas Pump Credit Card Fraud Identification & Prevention
Information System and Network Security
Systems Security Keywords Protecting Systems
CS 450/650 Fundamentals of Integrated Computer Security
Information and Network Security
Presentation transcript:

Typical Attack Techniques for Compromising Point of Sale PIN Entry Devices Physical Security Testing Workshop Steven Bowles, Project Manager Payment Assurance Electronic Warfare Associates - Canada 27 September 2005

Who Are We? Payment Assurance Lab –Interac Device Certification Agent –PCI Test Lab (in process of accreditation) ITSET Lab –Common Criteria –FIPS 140 –FIPS 201 Other Computer Security Consulting Services

Overview Introduction Threat Agent Goals Typical Vulnerabilities in PoS PEDs –Identifying & Exploiting Weaknesses –Tools & Techniques Design Considerations to Mitigate the Risk

Introduction Visa’s annual fraud costs have reached $2.77B USD worldwide –Only 0.06% of Visa’s annual revenue –Potential cost of lost confidence is much higher Two classes of payment cards –Magnetic Stripe (Magstripe) –Integrated Circuit Cards (Smartcards) Vast majority of payment card fraud is focused on Magstripe cards

Threat Agent Goals

Gather sets of magstripe data and the associated PINs, used to complete fraudulent financial transactions –Skim the card –Record the PIN Electronically Shoulder surfing (video or human) –Determine Secret Key values (cont.)

Typical Vulnerabilities Ineffective tamper-evident seals

Typical Vulnerabilities Easily accessible security relevant components (i.e. RAM chips, switches, inter-PCB connectors) (cont.)

Typical Vulnerabilities Openings that can be used to conceal penetration attempts or malicious circuitry (cont.)

Typical Vulnerabilities Surface mounted display covers attached with weak glues or epoxies (cont.)

Typical Vulnerabilities Easily accessible traces from the PIN Pad (cont.)

Typical Vulnerabilities Security relevant circuitry covered by weak epoxies (cont.)

Identifying & Exploiting Weaknesses Conduct an attack by: –Defeat passive tamper response mechanisms –Disable or bypass any relevant active tamper response mechanisms –Intercept key entry information from PIN Pad –Determine cryptographic keys (if necessary)

Identifying & Exploiting Weaknesses PED Attack Methodology 1.Enumeration of a PEDs sensitive components and physical safeguards to aid in planning an attack; 2.Gaining Access allows for the proving, refinement, and packaging of a theoretical attack; 3.Exploiting a PED with the developed attack vector to record sensitive data; and 4.Covering Tracks by effectively hiding the malicious modifications. (cont.)

Enumeration –Identify components and PCB traces that could provide access to sensitive information; –Determine where the active tamper detection sensors are, what they protect, and how they trigger; –Determine if tamper detection mechanisms can be disabled or bypassed from openings in the device; –Find any areas that can be cut into and covered up; make sure that the cuts won’t trigger a tamper response. evaluate whether or not it is possible to disable any or all tamper response mechanisms from these cuts; and –Determine if any cuts or openings allow access to security relevant traces or components (i.e. PIN Pad traces). Identifying & Exploiting Weaknesses (cont.)

Gaining Access –a procedure must be developed and refined such that the exploit can be executed economically and efficiently (according to PCI; $25k USD and 10 hrs.). –also include the development of any specialized tools or circuitry required to gain access to the sensitive data once exposed. Identifying & Exploiting Weaknesses (cont.)

Exploiting –It must be possible to insert the required malicious hardware and/or software needed to monitor or record the targeted sensitive data –Depending on the complexity of the attack, a Threat Agent may require a significant amount of practice to refine the technique –Retries of this nature can be frustrated if the PED enters into a severe non-operational state once the tamper response mechanisms have been triggered. won’t remain powered-up without the entry of authenticated keys or a password) Identifying & Exploiting Weaknesses (cont.)

Covering Tracks –Acquisition of cardholder data requires the participation of a non-colluding user –It must be possible to reassemble a compromised PED with original or replacement parts such that the exploit is not noticeable to the casual observer. if an exploit is making use of an opening under a removable cover, where the opening needs to be widened, care should be taken to ensure that a edge is left that can be used for reattaching the display cover once the exploit has been implemented. Identifying & Exploiting Weaknesses (cont.)

Tools & Techniques Hand-held Rotary Tool –access internal areas by cutting the case –removing internal case material in order to access security relevant components –for the removal of large/hard epoxies Adhesives –hold switches shut –hold other pieces in place Magnet Wire –Can be sharpened and inserted into small conductive vias on a PCB

Tools & Techniques Dental Pick –scraping epoxies from components or conductive vias –applying adhesives to keep tamper response switches closed –with a small amount of epoxy, can be used to place malicious wires and components into tight spaces. Conductive Epoxy –short out component contacts –act as a ‘cold weld’ for heat sensitive applications and tight areas. –easy method of attaching wires to traces that have been revealed by scrapping off the PCB’s conformal coating. (cont.)

Design Considerations to Mitigate the Risk

Run keypad/active tamper response mechanism traces on the middle layer(s) of a PCB; Place keypad/active tamper response mechanism vias in inaccessible areas; Keep active tamper response mechanisms independent of each other as long as possible; Try to place active tamper response traces and chip pins away from traces and chip pins that carry a signal similar to the ‘NO TAMPER DETECTED’ signals; (cont.)

Design Considerations to Mitigate the Risk Ensure that items on, or in the device, that are not meant to be removed, cannot be removed without triggering a tamper response mechanism; Do not rely only on passive mechanisms such as epoxy or tamper evident seals/labels; Avoid placing removable covers on the device; Design the device so that every aspect of the device increases the security of the device; Do not allow physical access to the internals of the device for any reason. (cont.)

Design Considerations to Mitigate the Risk Do not allow the device to be reset and/or reused after a physical attack has been attempted. Design active tamper response mechanisms that use conductive pucks to require a constant pressure applied to them to be effective; and Use tamper detection switches that are small and require a fair amount of pressure to keep the switch closed. (cont.)

In Closing Physical Security alone will never guarantee the security of our Systems.

Questions Steven Bowles Project Manager Payment Assurance EWA-Canada (613) x Mahalo!