[PDF][PDF] EMV in a nutshell

J Van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter - 2016 - cs.ru.nl
EMV is the leading international standard for payment smartcards, used by over a billion
cards worldwide. EMV is not a single protocol, but a large family of complex protocols, with …

The EMV standard: Break, fix, verify

D Basin, R Sasse, J Toro-Pozo - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
EMV is the international protocol standard for smartcard payment and is used in over 9
billion cards worldwide. Despite the standard's advertised security, various issues have …

Consumer-facing technology fraud: Economics, attack methods and potential solutions

MA Ali, MA Azad, MP Centeno, F Hao… - Future Generation …, 2019 - Elsevier
The emerging use of modern technologies has not only benefited society but also attracted
fraudsters and criminals to misuse the technology for financial benefits. Fraud over the …

Context-based co-presence detection techniques: A survey

M Conti, C Lal - Computers & Security, 2020 - Elsevier
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions

D Basin, R Sasse, J Toro-Pozo - 30th USENIX Security Symposium …, 2021 - usenix.org
Most EMV transactions require online authorization by the card issuer. Namely, the
merchant's payment terminal sends an authorization request to the card issuer over a …

Man-in-the-middle attack on contactless payment over NFC communications: design, implementation, experiments and detection

S Akter, S Chellappan, T Chakraborty… - … on Dependable and …, 2020 - ieeexplore.ieee.org
A recent development emanating from RFID technology is Near Field Communication
(NFC). Basically, NFC is a popular short range (< 10 cm) wireless communication …

Relay cost bounding for contactless EMV payments

T Chothia, FD Garcia, J De Ruiter… - … Cryptography and Data …, 2015 - Springer
This paper looks at relay attacks against contactless payment cards, which could be used to
wirelessly pickpocket money from victims. We discuss the two leading contactless EMV …

Practical EMV relay protection

AI Radu, T Chothia, CJP Newton… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Relay attackers can forward messages between a contactless EMV bank card and a shop
reader, making it possible to wirelessly pickpocket money. To protect against this, Apple Pay …

Does the online card payment landscape unwittingly facilitate fraud?

MA Ali, B Arief, M Emms… - IEEE Security & …, 2017 - ieeexplore.ieee.org
An extensive study of the current practice of online payment using credit and debit cards
reveals the intrinsic security challenges caused by differences in how payment sites operate …

[PDF][PDF] Cryptographic protocols from physical assumptions

A Koch - 2019 - core.ac.uk
Modern cryptography does not only enable to protect your personal data on the Internet, or
to authenticate for certain services, but also evaluate a function on private inputs of multiple …