Skip to content

EMVrace/auth-failure-attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Authentication Failure Attack

This repository contains the complementary material for our Usenix'23 paper Inducing Authentication Failures to Bypass Credit Card PINs. The material include:

  • Contactless.spthy: The modified version of our previous EMV contactless protocol model.
  • attack-trace.png: The attack trace corresponding to our authentication failure attack found by Tamarin using our modified model.

Replicate the attack finding experiment

First, you must have the following software installed and properly referenced:

  • Tamarin (see installation instructions here)
  • Python 2 (the scripts Mastercard.oracle and tools/decomment use this Python version.
    Should you want to use Python 3, you'll need to adapt these two scripts by properly referencing the executable programs #!/usr/bin/python3 and adding parentheses to Python's print calls in the scripts' source)

To find our attack with the tool, now follow the steps below:

  1. Download our original model from https://github.com/EMVrace/EMVerify.
  2. Replace the file Contactless.spthy with our modified version provided here.
  3. Delete the folder models-n-proofs.
  4. Run
    make -s kernel=Mastercard auth=CDA CVM=NoPIN value=High lemma=executable
    and the proof that such insecure execution (PIN-less & high-value) exists will be at models-n-proofs/contactless/Mastercard_CDA_NoPIN_High.proof.
  5. [Optional] To reproduce the graphical attack trace above, run Tamarin in interactive mode:
    tamarin-prover interactive models-n-proofs/contactless/Mastercard_CDA_NoPIN_High.spthy --heuristic=O --oraclename=Mastercard.oracle
    and follow the instructions. Please refer to the Tamarin manual for more on the tool's interactive mode.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •