long distance relay attack
play

Long Distance Relay Attack Luigi Sportiello Joint Research Centre - PowerPoint PPT Presentation

Long Distance Relay Attack Luigi Sportiello Joint Research Centre Institute for the Protection and the Security of the Citizen European Commission Smart Cards Something you have Secure data storage Qualify the holder for


  1. Long Distance Relay Attack Luigi Sportiello Joint Research Centre Institute for the Protection and the Security of the Citizen European Commission

  2. Smart Cards ˝Something you have˝ • Secure data storage • Qualify the holder for operations • Two possible communication technologies • Contact • Contactless •

  3. Contactless Smart Cards Command Contactless Card Reader (Slave) (Master) Response Some characteristics: • quick interactions • working distance: typically few cm •

  4. Reader-Card Communication Protocol ISO 14443 (+ ISO 7816-4) common solution for many contactless • smart card Some time constraints during the communication • Command Response APDU: read, write, … ISO7816-4 ISO14443 Frame | Encoded Response Response within max ~5s. ISO14443 Frame | Encoded Command ISO14443 Anticollision/Initialization

  5. Relay Attack Against a Contactless Smart Card Two devices are needed: • Proxy: emulates a contactless smart card • Mole: acts as reader nearby the victim card • Communication channel between Proxy and Mole • Command Command Command Response Response Response

  6. Relay Attack: Our Aim Relay attacks against contactless smart cards are not new • Some experiments featured with specific hardware modules • Lab conditions with short distances • Our proof of concept: • Long distance attack (>10Km) • In dynamic conditions (no constraints on devices positions) •

  7. Relay Attack on a Mobile Phone Network Off-the-shelf equipment • Mobile phones with NFC (ISO 14443 compliant) as Proxy and Mole • Mobile phone network for Proxy-Mole communication • Data network basically provided by all mobile phone network • operators Restricted/Private IP: Restricted/Private IP Internet no incoming connections Connection IP: Y.Y.Y.Y Cmd/Rsp IP: X.X.X.X Mole App Proxy App -Card Reader -Card Emulation -Accept Connections -Open Connection -Msg/Rsp Forwarding -Msg/Rsp Forwarding Mole Proxy NFC NFC

  8. Our Relay Attack Architecture Accept connections from phones Commands/Responses forwarding Open Socket Open Socket Cmd Rsp Rsp Cmd Cmd Cmd Rsp Rsp

  9. Our Relay Attack Architecture: More Details ISO 14443 ISO 14443 communication communication

  10. Relay Attack on a Geographical Scale We successfully relayed a Reader-ePassport communication over several kilometers • 15Km 42Km Authentication protocols useless against relay attacks • No longer possible to assume that a card is physically nearby the reader •

  11. No Timing Issues ISO 14443 communication Rsp Cmd On average, response waiting time ≈ 800ms.

  12. Live Experiment: Italy-Austria Relay Attack? Let’s try! • (you know, things never go well in these cases... we apologize in advance …) • 541Km

  13. Contactless Smart Card Applications Government (e.g., identification) • Banking (e.g., electronic payments) • Transport (e.g., tickets) • Access control • Loyalty programs • ... •

  14. Market Figures Source:

  15. Conclusions Long distance relay attack in dynamic conditions • against contactless smart cards proved A ˝botnet of smart cards˝ is possible • Practical countermeasures: • Access codes (e.g., MRZ, PIN) • Shielding •

  16. Thank you for your attention!

Recommend


More recommend