Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals

Dilpreet Singh, Ron Ruhl, Hamman Samuel

Abstract

Europay, MasterCard and Visa (EMV) is a dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. One goal of the EMV protocol is to secure debit and credit transactions at a point-of-sale (POS) terminal, but still there are vulnerabilities, which can lead to unauthorized disclosure of cardholder data. This research paper will provide the reader with a single document listing the vulnerabilities leading to various possible attacks against EMV payment card transaction process at a POS terminal. Attack tree methodology will be used to document these vulnerabilities. This research will also provide the countermeasures against various possible attacks.

Download


Paper Citation


in Harvard Style

Singh D., Ruhl R. and Samuel H. (2018). Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals.In Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-282-0, pages 494-502. DOI: 10.5220/0006723304940502


in Bibtex Style

@conference{icissp18,
author={Dilpreet Singh and Ron Ruhl and Hamman Samuel},
title={Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals},
booktitle={Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2018},
pages={494-502},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006723304940502},
isbn={978-989-758-282-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 4th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Attack Tree for Modelling Unauthorized EMV Card Transactions at POS Terminals
SN - 978-989-758-282-0
AU - Singh D.
AU - Ruhl R.
AU - Samuel H.
PY - 2018
SP - 494
EP - 502
DO - 10.5220/0006723304940502