6 CONCLUSIONS
This paper studied various attacks producing
unauthorized EMV card transaction at POS
terminals using an attack tree. Countermeasures
against those attacks are also provided. EMV card
industry participants can use this to understand the
risk to various parties during EMV transactions at a
POS terminal. This research adds to the existing
attack trees for ATM and browser EMV exploits.
REFRENCES
Bruce Schneier, "Attack Tree" [Online]. Available:
https://www.schneier.com/academic/archives/1999/12/
attack_trees.html [Accessed 11 May 2017].
EMV – Integrated Circuit Specifications for Payment
Systems, Book 2: Security and Key Management,
version 4.2 ed., LLC, June 2008.
Ezeude, Kingsley Anayo " The Modeling of An Identity
Catching Attack on The Universal Mobile
Telecommunication system (UMTS) Using Attack
Tree methodology" [Online]. Available: https://www.
scribd.com/document/243982400/The-Modeling-Of-
An-Identity-Catching-Attack-On-The-Universal-Mobi
le-Telecommunication-System-UMTS-Using-Attack-
Tree-Methodology [Accessed 14 May 2017].
How EMV (Chip and PIN) Works - Transaction Flow
Chart [Online]. Available: https://www.level2kernel.
com/flow-chart.html.
Joeri de Riuter and Erik Poll, Formal Analysis of EMV
Protocol Suite, Digital Security Group, Radboud
University Nijimegen, Netherlands. 2011 [Online]
Available; http://www.cs.ru.nl/E.Poll/papers/emv.pdf
Jordi van den Breekel, Diego A. Ortiz-Yepes, Erik Poll,
and Joeri de Ruiter, "EMV in a nutshell" [Online].
Available:https://www.cs.ru.nl/E.Poll/papers/EMVtec
hreport.pdf [Accessed 18 May 2017].
Jose Vila and Ricardo J. Rodrıguez," Practical
Experiences on NFC Relay Attacks with Android:
Virtual Pickpocketing Revisited"[Online]. Available:
https://conference.hitb.org/hitbsecconf2015ams/materi
als/Whitepapers/Relay%20Attacks%20in%20EMV%2
0Contactless%20Cards%20with%20Android%20OTS
%20Devices.pdf [Accessed 28 May 2017].
M. Bond. Chip and PIN (EMV) interceptor, March
2006.http://www.cl.cam.ac.uk/research/security/banki
ng/interceptor/ [Accessed 28 May 2017].
Maryam Mehrnezhad, Feng Hao, and Siamak F.
Shahandashti, " Tap-Tap and Pay (TTP): Preventing
the Mafia Attack in NFC Payment "[Online]. Availa-
ble:https://www.researchgate.net/publication/3001329
31_TapTap_and_Pay_TTP_Preventing_the_Mafia_At
tack_in_NFC_Payment [Accessed 12 June 2017].
Maxim Integrated Products, Inc., MAX1740, MAX1741
SIM/smart-card level translators in μMAX, January
2001, [Online] Available http://datasheets.maxim-
ic.com/en/ds/MAX1740-MAX1741pdf
Michael Roland and Josef Langer," Cloning Credit Cards:
A combined pre-play and downgrade attack on EMV
Contactless "[Online]. Available: https://www.usenix.
org/system/files/conference/woot13/woot13-roland.
pdf [Accessed 04 June 2017].
Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei
Skorobogatov, Ross Anderson" Chip and Skim:
cloning EMV cards with the pre-play attack," 2014
IEEE Symposium on Security and Privacy.
Ogundele Oludele, Zavarsky Pavol, Ruhl Ron and
Lindskog Dale, “Implementation of a Full EMV
Smartcard for a Point-of-Sale Transaction”, World
Congress on Internet Security (WorldCIS), 2011,
Publication Year: 2012, Pages(s): 28 – 35.
Oludele Ogundele, Pavol Zavarsky, Ron Ruhl, Dale
Lindskog" Fraud Reduction on EMV Payment Cards
by the Implementation of Stringent Security Features"
International Journal of Intelligent Computing
Research (IJICR), Volume 3, Issues 1/2, Mar/Jun 2012
PCI Quick Reference Guide Understanding the Payment
Card Industry Data Security Standard version 1.2
[Online] Available: https://www.pcisecuritystandards.
org/pdfs/pci_ssc_quick_guide.pdf [Accessed 02
October 2017]
Ross Anderson, Mike Bond, and Steven J. Murdoch" Chip
and Spin" [Online]. Available: http://www.chip
andspin.co.uk/spin.pdf [Accessed 15 March 2017].
Saar Drimer and Steven J. Murdoch," Chip and PIN
(EMV) relay attacks" [Online]. Available: https://
www.cl.cam.ac.uk/research/security/banking/relay/
[Accessed 08 June 2017].
Saar Drimer, Steven J. Murdoch, Ross Anderson"
Thinking Inside the Box: System-Level Failures of
Tamper Proofing" 2008 IEEE Symposium on Security
and Privacy
Step by step: How does a EMV contact card payment
work? [Online]. Available: https://www.quora.com/
Step-by-step-How-does-a-EMV-contact-card-payment
-work.
Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike
Bond " Chip and PIN is Broken," 2010 IEEE
Symposium on Security and Privacy.
Visa Expands Technology Innovation Program for U.S.
Merchants to Adopt Dual Interface Terminals.
[Online]. Available: http://usa.visa.com/download/
merchants/bulletin-tip-us-merchants-080911.pdf
Xilinx Inc., “Spartan-3E starter kit,” November 2009.
[Online]. Available: http://www.xilinx.com/products/
devkits/HW-SPAR3E-SK-US-G.htm
Ziv Kfir and Avishai Wool," Picking Virtual Pockets
using Relay Attacks on Contactless Smartcard
Systems" [Online]. Available: http://ieeexplore.ieee.
org/document/1607558/ [Accessed 24 May 2017].
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
502