A secure and authenticated mobile payment protocol against off-site attack strategy

L Fang, M Li, Z Liu, C Lin, S Ji, A Zhou… - … on Dependable and …, 2021‏ - ieeexplore.ieee.org
Mobile payment system has been expected to provide more efficient and convenient
payment methods. However, compared to traditional payments, mobile payment issues …

[PDF][PDF] MagEar: eavesdrop** via audio recovery using magnetic side channel.

Q Liao, Y Huang, Y Huang, Y Zhong, H **, K Wu - MobiSys, 2022‏ - huangyongzhi.com.cn
Speakers have been widely embedded in various electronic devices as a standard
configuration. The security vulnerability of microspeakers (such as earphones) is commonly …

Continuous intrusion: Characterizing the security of continuous integration services

Y Gu, L Ying, H Chai, C Qiao, H Duan… - 2023 IEEE Symposium …, 2023‏ - ieeexplore.ieee.org
Continuous Integration (CI) is a widely-adopted software development practice for
automated code integration. A typical CI workflow involves multiple independent …

A survey on contactless smart cards and payment system: Technologies, policies, attacks and countermeasures

BB Gupta, S Narayan - Journal of Global Information Management …, 2020‏ - igi-global.com
In recent years, contactless transactions have risen rapidly. It includes NFC, MST,
contactless cards, and many other payment methods. These payment methods have certain …

[PDF][PDF] Wallet payments recent potential threats and vulnerabilities with its possible security measures

M Bosamia, D Patel, S Chandaben… - Int. J. Comput. Sci. Eng, 2019‏ - researchgate.net
The volume of wallet payment transactions has considerably increased in the last decade.
There are many wallets already has been developed and also new wallets coming in the …

Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment

X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang… - 26th USENIX Security …, 2017‏ - usenix.org
Mobile off-line payment enables purchase over the counter even in the absence of reliable
network connections. Popular solutions proposed by leading payment service providers (eg …

[PDF][PDF] Mobile wallet payments recent potential threats and vulnerabilities with its possible security measures

MP Bosamia - Proceedings of the 2017 International Conference …, 2017‏ - researchgate.net
The volume of mobile wallet payment transactions has considerably increased in the last
decade. There are many mobile wallets already has been developed and also new mobile …

MagSnoop: listening to sounds induced by magnetic field fluctuations to infer mobile payment tokens

M Choi, S Oh, I Kim, H Kim - … of the 20th Annual International Conference …, 2022‏ - dl.acm.org
Samsung Pay, one of the most representative mobile payment services, allows mobile users
to make payment transactions almost anywhere using only their smartphone. This is thanks …

An eavesdrop** system based on magnetic side-channel signals leaked by speakers

Q Liao, Y Huang, Y Huang, K Wu - ACM Transactions on Sensor …, 2024‏ - dl.acm.org
The use of speakers in electronic devices has become widespread, but the security risks
associated with micro-speakers, such as earphones, are often overlooked. Many assume …

Eavesdrop** of magnetic secure transmission signals and its security implications for a mobile payment protocol

D Choi, Y Lee - IEEE Access, 2018‏ - ieeexplore.ieee.org
Magnetic secure transmission (MST) is a technology that emulates the action of swi** a
magstripe card in a card reader in that it artificially generates the magnetic signal produced …