Difference between revisions of "Publications/el-madhoun.22.aina"
From LRDE
(Created page with "{{Publication | published = true | date = 2022-01-01 | authors = Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle | booktitle = The 36th International Conference o...") |
|||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
| date = 2022-01-01 |
| date = 2022-01-01 |
||
| authors = Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle |
| authors = Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle |
||
− | | booktitle = |
+ | | booktitle = 36th International Conference on Advanced Information Networking and Applications (AINA) |
| title = New Security Protocols for Offline Point-of-Sale Machines |
| title = New Security Protocols for Offline Point-of-Sale Machines |
||
| abstract = EMV (Europay MasterCard Visa) is the protocol implemented to secure the communication, between a client's payment device and a Point-of-Sale machine, during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunatelythey have identified two security vulnerabilities that lead to multiple attacks and dangerous risks threatening both clients and merchants. In this paper, we are interested in proposing new security solutions that aim to overcome the two dangerous EMV vulnerabilities. Our solutions address the case of Point-of-Sale machines that do not have access to the banking network and are therefore in the "offline" connectivity mode. We verify the accuracy of our proposals by using the Scyther security verification tool. |
| abstract = EMV (Europay MasterCard Visa) is the protocol implemented to secure the communication, between a client's payment device and a Point-of-Sale machine, during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunatelythey have identified two security vulnerabilities that lead to multiple attacks and dangerous risks threatening both clients and merchants. In this paper, we are interested in proposing new security solutions that aim to overcome the two dangerous EMV vulnerabilities. Our solutions address the case of Point-of-Sale machines that do not have access to the banking network and are therefore in the "offline" connectivity mode. We verify the accuracy of our proposals by using the Scyther security verification tool. |
||
+ | | publisher = Springer |
||
+ | | series = Lecture Notes in Networks and Systems |
||
+ | | volume = 450 |
||
| type = inproceedings |
| type = inproceedings |
||
| id = el-madhoun.22.aina |
| id = el-madhoun.22.aina |
||
− | | identifier = doi: |
+ | | identifier = doi:10.1007/978-3-030-99587-4_38 |
| bibtex = |
| bibtex = |
||
@InProceedings<nowiki>{</nowiki> el-madhoun.22.aina, |
@InProceedings<nowiki>{</nowiki> el-madhoun.22.aina, |
||
− | author = <nowiki>{</nowiki>El Madhoun |
+ | author = <nowiki>{</nowiki>Nour El Madhoun and Emmanuel Bertin and Mohamad Badra and |
− | + | Guy Pujolle<nowiki>}</nowiki>, |
|
− | booktitle = <nowiki>{</nowiki> |
+ | booktitle = <nowiki>{</nowiki>36th International Conference on Advanced Information |
− | Networking and Applications (AINA |
+ | Networking and Applications (AINA)<nowiki>}</nowiki>, |
title = <nowiki>{</nowiki>New Security Protocols for Offline Point-of-Sale |
title = <nowiki>{</nowiki>New Security Protocols for Offline Point-of-Sale |
||
Machines<nowiki>}</nowiki>, |
Machines<nowiki>}</nowiki>, |
||
Line 33: | Line 36: | ||
connectivity mode. We verify the accuracy of our proposals |
connectivity mode. We verify the accuracy of our proposals |
||
by using the Scyther security verification tool.<nowiki>}</nowiki>, |
by using the Scyther security verification tool.<nowiki>}</nowiki>, |
||
− | + | publisher = <nowiki>{</nowiki>Springer<nowiki>}</nowiki>, |
|
+ | series = <nowiki>{</nowiki>Lecture Notes in Networks and Systems<nowiki>}</nowiki>, |
||
+ | volume = <nowiki>{</nowiki>450<nowiki>}</nowiki>, |
||
+ | doi = <nowiki>{</nowiki>10.1007/978-3-030-99587-4_38<nowiki>}</nowiki> |
||
<nowiki>}</nowiki> |
<nowiki>}</nowiki> |
||
Latest revision as of 10:30, 15 December 2022
- Authors
- Nour El Madhoun, Emmanuel Bertin, Mohamad Badra, Guy Pujolle
- Where
- 36th International Conference on Advanced Information Networking and Applications (AINA)
- Type
- inproceedings
- Publisher
- Springer
- Date
- 2022-01-01
Abstract
EMV (Europay MasterCard Visa) is the protocol implemented to secure the communication, between a client's payment device and a Point-of-Sale machine, during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunatelythey have identified two security vulnerabilities that lead to multiple attacks and dangerous risks threatening both clients and merchants. In this paper, we are interested in proposing new security solutions that aim to overcome the two dangerous EMV vulnerabilities. Our solutions address the case of Point-of-Sale machines that do not have access to the banking network and are therefore in the "offline" connectivity mode. We verify the accuracy of our proposals by using the Scyther security verification tool.
Bibtex (lrde.bib)
@InProceedings{ el-madhoun.22.aina, author = {Nour El Madhoun and Emmanuel Bertin and Mohamad Badra and Guy Pujolle}, booktitle = {36th International Conference on Advanced Information Networking and Applications (AINA)}, title = {New Security Protocols for Offline Point-of-Sale Machines}, year = {2022}, abstract = {EMV (Europay MasterCard Visa) is the protocol implemented to secure the communication, between a client's payment device and a Point-of-Sale machine, during a contact or an NFC (Near Field Communication) purchase transaction. In several studies, researchers have analyzed the operation of this protocol in order to verify its safety: unfortunately, they have identified two security vulnerabilities that lead to multiple attacks and dangerous risks threatening both clients and merchants. In this paper, we are interested in proposing new security solutions that aim to overcome the two dangerous EMV vulnerabilities. Our solutions address the case of Point-of-Sale machines that do not have access to the banking network and are therefore in the "offline" connectivity mode. We verify the accuracy of our proposals by using the Scyther security verification tool.}, publisher = {Springer}, series = {Lecture Notes in Networks and Systems}, volume = {450}, doi = {10.1007/978-3-030-99587-4_38} }