Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cloning Credit Cards - A Combined Pre-play and Downgrade Attack on EMV Contactless

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into a novel attack scenario targeting EMV contactless payment cards. Learn about a combined pre-play and downgrade attack that enables the creation of functional card clones containing credit card data and pre-played authorization codes. Discover how these clones can be used to perform a limited number of EMV Mag-Stripe transactions at any EMV contactless payment terminal. Gain insights into the security concerns surrounding contactless payment infrastructures, particularly in Austria and Germany, and understand how this attack differs from well-known scenarios like relay attacks and skimming. Presented by Michael Roland and Josef Langer from the NFC Research Lab Hagenberg at the University of Applied Sciences Upper Austria, this 27-minute talk challenges common assumptions about the security of contactless payment systems and highlights potential vulnerabilities in EMV technology.

Syllabus

WOOT '13 - Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless

Taught by

USENIX

Reviews

Start your review of Cloning Credit Cards - A Combined Pre-play and Downgrade Attack on EMV Contactless

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.