A concept of automated vulnerability search in contactless communication applications

Martin Henzl, P. Hanáček, Peter Jurnecka, Matej Kacic
{"title":"A concept of automated vulnerability search in contactless communication applications","authors":"Martin Henzl, P. Hanáček, Peter Jurnecka, Matej Kacic","doi":"10.1109/CCST.2012.6393556","DOIUrl":null,"url":null,"abstract":"Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified to be highly secure; however, inappropriate protocol implementation may result in the leak of sensitive information, even if the protocol is also secure by itself. In this paper we show a concept of automated vulnerability search in protocol implementation by using verification methods, which should help developers to verify their applications. We also show simple example of possible attack on seemingly secure payment protocol implemented using seemingly secure smart card to show the way the adversary can abuse improper implementation. The vulnerability the attacker exploits can be in one command or in a combination of commands, which are not vulnerable individually. It is not easy to find such combinations manually, this is where the automated verification methods are put to use. A model checker, provided with an appropriate model, can automatically find vulnerabilities which are not likely to be found manually. The model can be created by the actual communication analysis. We wanted to show that the adversary does not have to have the access to the source code of the application to perform a successful attack, so a platform for the application analysis from the actual contactless communication was developed. The platform provides eavesdropping, altering data for man-in-the-middle attack, and emulating of both communication parties. The source code can help the analysis, but would not be sufficient by itself, so creating model from source code was left for future research. When the model checker finds vulnerability, an attack can be executed. The attack can be either successful, revealing real vulnerability which must be fixed, or unsuccessful, which would result in the model refinement and another model checker run.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393556","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Designing and implementing secure applications which use contactless communication link is difficult even when secure hardware is used. Many current proximity devices, such as contactless smart cards or near field communication devices, are verified to be highly secure; however, inappropriate protocol implementation may result in the leak of sensitive information, even if the protocol is also secure by itself. In this paper we show a concept of automated vulnerability search in protocol implementation by using verification methods, which should help developers to verify their applications. We also show simple example of possible attack on seemingly secure payment protocol implemented using seemingly secure smart card to show the way the adversary can abuse improper implementation. The vulnerability the attacker exploits can be in one command or in a combination of commands, which are not vulnerable individually. It is not easy to find such combinations manually, this is where the automated verification methods are put to use. A model checker, provided with an appropriate model, can automatically find vulnerabilities which are not likely to be found manually. The model can be created by the actual communication analysis. We wanted to show that the adversary does not have to have the access to the source code of the application to perform a successful attack, so a platform for the application analysis from the actual contactless communication was developed. The platform provides eavesdropping, altering data for man-in-the-middle attack, and emulating of both communication parties. The source code can help the analysis, but would not be sufficient by itself, so creating model from source code was left for future research. When the model checker finds vulnerability, an attack can be executed. The attack can be either successful, revealing real vulnerability which must be fixed, or unsuccessful, which would result in the model refinement and another model checker run.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
非接触式通信应用中漏洞自动搜索的概念
即使使用安全硬件,设计和实现使用非接触式通信链路的安全应用程序也是困难的。许多当前的接近设备,如非接触式智能卡或近场通信设备,被证明是高度安全的;但是,如果协议实现不当,可能会导致敏感信息的泄露,即使协议本身也是安全的。本文提出了一种利用验证方法在协议实现中自动进行漏洞搜索的概念,这将有助于开发人员验证他们的应用程序。我们还展示了使用看似安全的智能卡实现的看似安全的支付协议的可能攻击的简单示例,以显示攻击者可以滥用不当实现的方式。攻击者利用的漏洞可能存在于一个命令中,也可能存在于命令的组合中,这些命令不会单独受到攻击。手动找到这样的组合并不容易,这就是自动验证方法被使用的地方。提供了适当模型的模型检查器可以自动发现人工不可能发现的漏洞。该模型可通过实际通信分析建立。我们想要表明,攻击者并不需要访问应用程序的源代码来执行成功的攻击,因此开发了一个用于从实际非接触式通信中分析应用程序的平台。该平台提供了窃听、中间人攻击篡改数据、通信双方仿真等功能。源代码可以帮助分析,但本身是不够的,因此从源代码创建模型是留给未来的研究。当模型检查器发现漏洞时,就可以执行攻击。攻击可能成功,暴露出必须修复的真正漏洞,也可能不成功,这将导致模型细化并运行另一个模型检查器。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Department of Defense Instruction 8500.2 “Information Assurance (IA) Implementation:” A retrospective Attack tree-based evaluation of physical protection systems vulnerability Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality A concept of automated vulnerability search in contactless communication applications Working towards an international ANPR Standard — An initial investigation into the UK standard
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1