Security in a Mobile App World – A Payments Perspective

advertisement
Security in a Mobile App World A Payments Perspective
James Sellwood
6th Sept 2014
About Me


Electronic Payments
Consultant

Credit Cards

Terminals

Contactless /
NFC / HCE
Security Consultant

Payment Systems

Mobile


RHUL ISG

Alumni
(MSc '12)

Part-time Student
(PhD '1x)
Information Security
Research

Android

Access
Control
Presentation Overview

Payments' use of software


Past, present and imminent
The mobile app world's impact on:

Requirements

Development

Testing

Risk

Security
What this is

My personal view & understanding

Example based

Generalised & simplified

Comparative

UK biased (but not UK specific)
What this is NOT

Employer or client endorsed

Comment (+/-) about any brand shown

Providing answers

The entire story

Historically

Technologically

Geographically
Usage of Payment Cards & Banking Services
A selective history, highlighting
changes in: usability, risks & security
Embossing
http://www.theukcardsassociation.org.uk/cards-transactions/card-present-transactions.asp
static data
Magnetic Stripe
http://www.q-card.com/support/magnetic-stripe-card-standards.asp
static data
Magnetic Stripe

Improve speed of transaction

Degradation (slow)

Automated Entry


No mistyping / miscopying of card details
No carbon paper copy of card details
ATM
software
http://labby.co.uk/2011/03/decommissioning-a-cash-machine-atm/
ATM

Greater availability

Outside bank opening hours

Unattended locations

Cardholder attacks

Isolated system

Two-factor authentication

Online PIN
Contact Chip
dynamic data
software
secure chip
https://www.cibc.com/ca/credit-cards/dividend-one-mastercard.html
Contact Chip


Active participation in transaction

Dynamic data creation

Offline transaction approval

Offline PIN verification

Issuer scripting at POS
Hardware-based secure storage &
processing protects

Application logic

Cryptographic keys
Online Banking
software
https://www.halifax-online.co.uk/personal/logon/login.jsp
Online Banking

Greater availability

Any physical location

Variety of PC-specific threats

Device fingerprinting

Authentication

Passwords

Two-factor authentication
Contactless Chip
dynamic data
software
secure chip
contactless
http://www.bluestarinc.com/us-en/solutions/security/news/single/news/detail/News/
chip-and-pin-the-future-of-credit-cards.html
Contactless Chip


Improve speed of transaction

No dip

Faster data exchange

No PIN verification (low-value)
Proximal data access


Privacy
Should remain in control of cardholder
Dual Interface Chip
dynamic data
software
secure chip
contactless
http://www.kinodesign.com/featured-work/barclaycard/07-Card-design-for-life
Dual Interface Chip


Flexibility of both contactless and contact

Speed and convenience

Issuer scripting at POS
Amount and velocity limits...
then revert to contact, reset counters and
then carry on as before
Stickers
dynamic data
software
secure chip
contactless
http://allaboutwindowsphone.com/flow/item/14658_Barclaycard_PayTag_sticks_NFC_.php
Stickers

No need to carry a card



Stick it to what you like
(e.g. something you carry regularly)
Limited ways to update counters
Amount and velocity limits...
then decline
Mobile Banking (App)
software
software
protection
http://www.computerweekly.com/news/2240105562/RBS-and-Natwest-launch-nativeBlackberry-app-for-bank-transfers
open
distribution
data
connection
Mobile Banking (App)

No need to have access to a PC



You already carry a smartphone –
apparently
Variety of mobile-specific threats
Device fingerprinting as well as user
authentication
Mobile (NFC)
dynamic data
software
secure chip
contactless
http://www.engadget.com/2014/03/14/google-wallets-tap-to-pay-feature-will-requireandroid-4-4-kitk/
data
connection
Mobile (NFC)

No need to carry a card


Mobile network provides non POS-based
communications channel


Do need NFC capable smartphone
(even more attractive target)
Issuer scripting wherever data available
User interface allows user control

Activate / deactivate

Passcode: every transaction / high-value
Mobile (HCE)
dynamic data
software
software
protection
contactless
open
distribution
http://nfctimes.com/news/capital-one-reveals-reasons-quitting-isis-early-role-promoting-hce
data
connection
Mobile (HCE)



Wider availability

Easier (cheaper) issuance

Less interoperability restrictions
No hardware-based secure element
Limited transaction data on device with
limited validity period

Short-lived keys

Risk informed approach
Impact of the Mobile App World
Mobile App Requirements

Identification (device / app / customer)

Authentication (device / customer)

Authorization (request)

Confidentiality (customer data / keys)

Integrity (request)

Availability (service)

Auditing (everything)
Development
(mobile versus pre-mobile)

Less niche knowledge required

Less technological constraints

Wider choice of supporting libraries



Significant volume of information available
online
Demand for fast paced, iterative product
improvement
Frequent API change
Testing
(mobile versus pre-mobile)

Generic testing frameworks available

More features to test



More security frameworks now part of the
product (rather than underlying
architecture)
More iterations to be tested
Cannot now test all the possible component
combinations
Risk
(mobile versus pre-mobile)




More information available to inform
decision making
Cardholder owned device with no
provenance
Base security architecture may be weaker
Less experienced development teams and
proliferation of “code by Google”
Security
(mobile versus pre-mobile)

Modern interfaces

Graded responses or temporary restrictions

More information-driven

More reliant on active monitoring


Application code open to malicious
evaluation
Many more endpoints, particularly ones
accessed by untrusted nodes
Closing Thoughts

Risk landscapes change

Good / Bad

Advancement / Bug

Business / Outsider

Not (as) secure versus secure enough

Financial versus reputational loss

More data is only useful if you can interpret
and act on it
Questions
Download