dangerous for people using contactless payment.
In the past, the PIN number itself was not enough
as the card was necessary, too. Now, as we have
proven earlier, owing to the PayPass contactless
payment, it is enough to stand close to the victim
and use their card to carry out the transaction. When
you add the PIN code obtained in a thermal imaging
attack to the equation, the limit set for the amount of
money spent disappears completely (since it is
authorized by the stolen PIN code). In order to avoid
modern cybercriminals, you have to be extremely
cautious and sensible while using technological
devices. It is not enough to protect yourself against
one threat only; you need to take safety measures
against all forms of attacks, and this step requires
knowledge and proactive behavior. The key action
taken by manufacturers and providers of such
modern devices should be raising users’ awareness
of potential threats and how to deal with them.
ACKNOWLEDGEMENTS
We would like to thank Mr. Janusz Rogula, PhD.
Eng. of Institute of Power Engineering and Fluid
Mechanics of Wroclaw University of Technology
for lending measuring instruments necessary to carry
out our research. We would also like to extend our
gratitude to the authorities of Bank Zachodni WBK,
in particular to Mrs. Monika Bejma and Mr. Rafal
Wachowski, for their trust and sharing their cash
machines as research tools. This research was
supported by National Research Center grant
PRELUDIUM no 2014/15/N/ST6/04375.
REFERENCES
Kocher, Paul, (1996). Timing Attacks on Implementa-
tions of Diffie-Hellman. RSA, DSS, and Other
Systems, Advances in Cryptology—CRYPTO’96.
Messerges, Thomas S., Ezzy A. Dabbish, and Robert H.
Sloan, (1999). Investigations of power analysis attacks
on smartcards. In Proceedings of the USENIX
Workshop on Smartcard Technology on USENIX
Workshop on Smartcard Technology (WOST'99).
Kocher, Paul, J. Jaffe, and B. Jun. (1999). Differential
power analysis. Proceedings of CRYPTO'99, vol.
1666, pp. 388-397.
Van Eck, W. (1985). Electromagnetic radiation from video
display units: An eavesdropping risk? Computers &
Security 4, 4.
Markettos, A. T. and S. W. Moore. (2009). The Frequency
Injection Attack on Ring-Oscillator-Based True
Random Number Generators. In Proceedings of
Cryptographic Hardware and Embedded Systems
(CHES). Lecture Notes in Computer Science 5747,
Springer, pp. 317-331.
Li, H., A. T. Markettos and S. W. Moore. (2005). A
Security Evaluation Methodology for Smart Cards
Against Electromagnetic Analysis. In Proceedings of
the 39th IEEE International Carnahan Conference on
Security Technology (ICCST 2005), Las Palmas de
Gran Canaria, Spain, pp. 208-211.
Markettos, A. T. and S. W. Moore. (2004).
Electromagnetic Analysis of Synchronous and
Asynchronous Circuits using Hard Disc Heads. 16th
UK Asynchronous Forum, Manchester, UK.
Zalewski, Mariusz. (2005). Cracking safes with thermal
imaging, [online] Available at: http://lcamtuf.
coredump.cx/tsafe. [Accessed 23 May 2016].
Meiklejohn, Sarah and Stefan Savage. (2011). Heat of the
Moment: Characterizing the Efficacy of Thermal
Camera-Based Attacks. Proceedings of Workshop on
Offensive Technologies (WOOT).
Snapsupplies.com. (2014). ATM Skimming Devices,
[online] Available at: https://www.snapsupplies.com/
Snap/Industry-News/ATM-Skimming-Devices_12.asp
x. [Accessed 23 May 2016].
Stefan Wisniewski, Tomasz S. Wisniewski. (2012).
Wymiana ciepla, WNT.
Hanzlik, L., W. Wodo. (2013). Identity security in
biometric systems based on keystroking. International
Conference on Security and Cryptography
(SECRYPT), Reykjavik, Iceland.
Hancke, Gerhard P., (2005). A practical relay attack on
ISO 14443 proximity cards. Technical report,
University of Cambridge Computer Laboratory.