SlideShare a Scribd company logo
1 of 38
Download to read offline
The Achilles Heel of
GPN Card Implementation
B. Noviansyah / @tintinnya
Presented at IDSecConf 2020
12--13 December 2020
What Does This Presentation All About
➢ Share my observation towards Gerbang Pembayaran Nasional (GPN) cards,
focusing on the implementation flaw of Chip-based ATM/Debit Card with
NSICCS (National Standard Indonesia Chip Card Specification) Applet that is
derived from EMV Standard
➢ I will not share the full detail, since the impact is still major, affecting millions
of users. But the trends are decreasing near the migration deadline
➢ Suggests what should Card Issuers do towards this finding to protect users
from similar threats
➢ Suggest what should we as customers do towards this
finding to protect our own money and account
2
GPN Logo from www.bi.go.id
Hello, I am TinTin
Been there, done that
★ Java EE Programmer since 2002
○ Tab Person
○ K&R with 1TBS
★ Internal Pentester
★ Information Security Policy maker
★ Enterprise Security Architect
★ Digital Forensics
○ Host-based forensics: Image Acquisition
with dcfldd, DumpIt, Tableau
○ Cloud-based forensics: Image Acquisition
with gsutil
○ Analyze image with TSK, autopsy
★ Blockchain Enthusiast
○ Solidity on Private Ethereum on Ubuntu
★ Advisor of Information Security for
Payment System and FinTech
3
Formal, Professional Ed, and Certification
★ Teknik Informatika Institut Teknologi
Bandung
○ Sistem Terdistribusi
★ Heinz College Carnegie Mellon University
○ Master of Science in Information Security
Policy and Management
○ Cyber Forensics and Incident Response
(CyFIR) Track
○ Chief of Information Security Officer (CISO)
Executive Education Certificate
★ Certification:
○ EC-Council’s CEH v4.1
○ EXIN’s ITIL Foundation v2
○ SGS’ ISO 20000 LA
4
★ Payment Systems are closer than we
thought.
★ One of the instruments in Payment
Systems is Card-based Payment
Instrument.
★ Migration of Magstripe to Chip as
Part of Security Control. But How
secure is Chip-based Payment Card?
★ To see the magnitude of impact
when chip-based implemented and
distributed to the public
Why Did I Choose This
Topic?
Card-based Payment System Instrument in Blueprint
5
Blueprint Sistem Pembayaran Indonesia 2025, 28 November 2019
One of the Problems with Payment Card
6
https://nasional.tempo.co/read/680461/sepertiga-kasus-skimming-di-duni
a-terjadi-di-indonesia/full&view=ok
https://www.beritasatu.com/faisal-maliki-baskoro/ekonomi/269376/bank-i
ndonesia-jumlah-fraud-terus-menurun
“From the last 3 years, there are 5,500
skimming case in the world. And
1,549 cases happened in Indonesia.”
~Brigjen Victor E. Simanjuntak, Director of Economic and
Special Crime, Criminal Investigation Agency of
Indonesian Police Force, July 2nd, 2015~
“Indonesia is still in the lowest
position for banking crime rates since
2012 compared to other Southeast
Asian countries. From 2014 and until
February 2015, card-based fraud only
0.0008% of total amount transaction”
~Eni V Panggabean, Head of Payment System Policy
and Supervision Department, Bank Indonesia,
April 28th, 2015~
In 2010, Fraud amount was IDR 55 billion
In 2015, Fraud amount was IDR 33 billion
What about now in 2020?
Understanding the Impact: Card Growth
7
Source: Bank Indonesia’s Payment System Statistics
https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/jumlah%20apmk%20beredar.aspx
Understanding the Impact: Amount and Volume
ATM/D Card
8
Source: Bank Indonesia’s Payment System Statistics
https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/transaksi.aspx
Understanding the Impact: Amount and Volume
Credit Card
9
Source: Bank Indonesia’s Payment System Statistics
https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/transaksi.aspx
Understanding the Impact: Infrastructure
10
Source: Bank Indonesia’s Payment System Statistics
https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/infrastrukturapmk.aspx
Understanding the Impact: Bank Indonesia’s Licensee
11
116 Total Financial Institutions
75 Total Issuer ATM/D Card
23 Total Acquirer D Card
26 Total Issuer CC
17 Total Acquirer CC
34 Total Issuer ATM Card
Infrastructures:
ATMs: ~105 thousands
EDCs: ~1,4 millions
Merchants: ~ 906 thousands
Understanding the Impact: TL;DR
12
Cards:
ATM/D Cards: ~200 millions
Credit Cards: ~18 millions
ATM Cards: ~ 10 millions
ATM/D Transactions:
Total Transactions: 565 millions
Total Amount: ~IDR 580 trillion
CC Transactions:
Total Transactions: 22 millions
Total Amount: ~IDR 18 trillion
To roll-out security enhancement or migration, it is like
moving an elephant
★ Card Present (CP) Transaction, both
with Magstripe and Chip
★ Linkage between NSICCS and EMV
★ Contact-based card ISO7816
★ ATM/Debit Cards Only
★ Interaction between chip and
Terminal
13
Focus of This
Presentation
★ Card Not Present (CNP) Transaction,
such as online transaction
★ EMV on Credit Cards
★ Contactless Cards ISO14443
★ Communication between Terminal
and Host
14
Will not be the Focus
of This Presentation
How Do Cards Interact With Bank’s Back-end?
15
...and Skimmers are sitting there in the card slot,
reading and copying the data from magstripe, or
tampering the EDC and stored it in malicious chip
inside the EDC.
What Make Skimmers Win Your Money?
Your Card Your PIN: pinhole camera and/or overlayed PIN pad
16
https://www.boredpanda.com/how-to-spot-atm-scam/
Your Card data and your PIN were sold to
online forum. Buyer can write the data
into a different magstripe card and use
the PIN to withdraw your money
Chip-based Card to Reduce Skimming Fraud
17
https://blog.tdecu.org/why-are-chip-cards-more-secure-than-swiping
https://squareup.com/us/en/townsquare/why-are-chip-cards-more-se
cure-than-magnetic-stripe-cards
Image from:
https://squareup.com/us/en/hardware/contactless-chip-reader
Chip-based Card to Reduce Skimming Fraud
18
https://www.thalesgroup.com/en/markets/digital-identity-and-security
/banking-payment/cards/emv/about
https://www.vice.com/en/article/mgbm7p/why-chip-cr
edit-cards-are-more-secure-than-magnetic-stripes
Banks Urge Customers To Migrate Their Magstripe
Card
19
https://www.bbc.com/indonesia/indonesia-43486801
https://finance.detik.com/bursa-dan-valas/d-3874531/gratis-
migrasi-kartu-atm-jadi-pakai-chip
https://www.liputan6.com/bisnis/read/3939518/biar-aman-dir
ut-bca-minta-nasabah-segera-migrasi-ke-teknologi-chip
https://finance.detik.com/bursa-dan-valas/d-3874
329/kartu-atm-belum-pakai-chip-ini-risikonya
https://www.liputan6.com/bisnis/read/3502530/bri-imbau-n
asabahnya-segera-migrasi-kartu-atm-ke-teknologi-chipBank Indonesia circulated Letter
Nr. 17/52/DKSP dated Dec 30th,
2015 and set the deadline of
100% migration from Magstripe
Card to Chip-based Card on
Jan 1st, 2022
...but Banks Still Allowed to Issued Magstripe Card.
20
Surat Edaran No.17/52/DKSP Tanggal 30 Desember 2015
Implementasi Standar Nasional Teknologi Chip dan Penggunaan
Personal Identification Number Online 6 (Enam) Digit untuk Kartu
ATM dan/atau Kartu Debet yang Diterbitkan di Indonesia
Only for Account with maximum balance of IDR
5 million, with proper risk management from
Bank Issuer
Luckily, The Cards Could Not Be Used Overseas, Right?
21
https://finance.detik.com/moneter/d-4143357/baru-terbit-gpn-tidak-bi
sa-dipakai-di-luar-negeri
https://www.republika.co.id/berita/ekonomi/keuangan/18/07/30/pcog
zj370-kartu-berlogo-gpn-belum-bisa-dipakai-di-luar-negeri
https://www.liputan6.com/bisnis/read/3587012/alasan-kartu-debet-gp
n-belum-bisa-dipakai-di-luar-negeri
GPN Card optimizes for domestics transaction.
Customers could ask Visa/MasterCard for
overseas transaction purpose
https://ekonomi.kompas.com/read/2018/04/16/193000726/seperti-jc
b-dan-unionpay-bisakah-gpn-dipakai-untuk-transaksi-di-luar-negeri-?pa
ge=all
★ Does GPN Card with NSICCS applet
able to protect us as customers from
counterfeited card created by
international skimmer syndicate and
being used to perform unauthorized
transactions (e.g. withdrawal)?
22
Problem Statement
Bank Indonesia has set National
Standard Indonesian Chip Card
Specification (NSICCS) as the country’s
technology benchmark for ATMs and
debit cards of all card providers across
the country.
All cards should be migrated 100%
1 January 2022 at the latest.
The (Zero-knowledge) Observations
Which EMV version is adopted by NSICCS for GPN?
23
https://www.thejakartapost.com/news/2017/06/22/bank-indonesia-set
s-chip-technology-standard-for-atms-debit-cards.html
APDU: TLV (Tag Length Value)
No NSICCS Book, just EMV 4.1 Books
1--3
The NSICCS Observations thru EMV 4.1 Books
24
What Do You Need To Read the Card
1. Hardware:
a. Smartcard Reader and Magstripe
Reader/Writer
25
2. Software:
a. Python Libraries to communicate with
USB Smartcard
b. DLL and x86 application for read write
Reading the Card
PSE (Payment System Environment)
26
MasterCards from Bank B has NSICCS Applet as Priority #1 over DEBIT MASTERCARD Applet
Reading the Card
27
Enumerating Available AIDs
GPN Cards have Visa Applet, except GPN Card from
Bank A
Visa Cards and MasterCards have NSICCS Applet
If GPN Card has Visa Applet, does it means that this card can be
processed by Non-NSICCS Terminal? Let alone the routing of BIN could
not be found by Visa Principal This is false positive, since old AIDs of
Global Platform “borrowed” 5 bytes from VISA’s AID.
Findings: Card Properties
28
⭕= n/a, 🛑 = Not Supported, * = Using AID Enumeration, not with PSE
Some cards are only support SDA, not DDA. SDA (Static Data Authentication) is the less secure compare with DDA (Dynamic Data Authentication)
Findings: EMV Tag can be easily read. No Encryption
scrambled or protected it
29
EMV chip-based card is not protecting the data inside the card from being copied.
Instead, EMV chip-card serves as a mini computer to conduct APPLICATION CRYPTOGRAM calculation to
generate dynamic data and send along with the transaction information to ISSUER HOST. This authentication
process makes EMV card is more secure than magstripe card.
This finding is exploited by
copying the data from EMV
tag to Magstripe, with
certain modification.
The results were surprising.
Findings: One Bank has EMV Tag similars with
Magstripe Data(!)
30
1. Testcase:
a. Modify data from EMV Tag, and write it on magstripe with 4 scenarios of cash withdrawal
b. On-Us ATM EMV, On-Us ATM Magstripe, On-Us EDC
c. Off-Us ATM EMV, Off-Us ATM Magstring, Off-Us EDC
d. There are 4 scenarios tested on 6 types of terminals. Not all tested banks have these terminal
types
2. Results:
a. Most of cash withdrawal test cases are successfully executed on the Off-Us terminals
b. Data from magstripe basically discourage EDC to read it, hence some tag need to be replaced
i. Some banks not check the integrity of data in the back end. They just simply rely on
logics in terminal (ATM/EDC)
ii. Some banks only rely on EDC to prevent card being used based on certain tags
iii. Some banks only rely on EDC to prevent card being used based on
BIN. The EDC still has FALLBACK mechanism to accept
magstripe instead of chip
Developed Test Cases and Results
31
Findings: Recaps
1. Data in EMV chip is not encrypted, and can be read within < 1s
2. One Bank’s GPN Card has similar data between EMV and Magstripe
3. Most of cash withdrawal use cases using copied card are successfully
executed on the Off-Us terminals
4. Data from magstripe basically discourage EDC to read it, hence some tag
need to be replaced
a. Some banks not check the integrity of data in the back end
b. Some banks only rely on EDC to prevent data, based on certain part
c. Some banks only rely on EDC to prevent data based on BIN
5. GPN cards still have VISA/MasterCard applet
6. VISA/MasterCard Cards still have GPN applet
7. Above modifications are still requiring valid PIN.
32
★ As long as magstripe still co-exists
with EMV Chip, there’s still a chance
for GPN card users become victim of
card shimming and/or card
skimming. This is also applies with
VISA/Mastercard.
★ This is not a final conclusion, since
only 6 issuers bank that were tested.
There are 75 licensees, and 6 are not
enough to represent these.
33
Answering
Problem Statements
Customers:
Stay Vigilant: Skimmer still targeting your magstripe
34
Source: Pixabay.com
Customers:
Stay Vigilant: Shimming Devices Targeting your Chip
35
Source:
https://krebsonsecurity.com/2015/08/chip-card-atm-shimmer-found-in-mexico/
https://krebsonsecurity.com/2017/01/atm-shimmers-target-chip-based-cards/
Banks:
Increase your visibility
36
Check your back-end. Data integrity
verification is a must.
Do not simply rely on data: “PIN and
Card are valid” without supported by
auxiliaries data, e.g. CCTV, pattern
of customers movement
Standard Body and Central Bank:
Increase security level of the standard
37
Evaluates and Enhanced the
standard. Attacking SDA Card
already available on the Internet.
Enforce a comprehensive risk
management towards GPN Card
Implementation, that include risk
assessment in Chip and Magstripe
38
Thank You
@tintinnya

More Related Content

What's hot

E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
Digital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by NetceteraDigital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by NetceteraNetcetera
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Cardless and contactless transactions
Cardless and contactless transactionsCardless and contactless transactions
Cardless and contactless transactionsMichal Voldrich, MBA
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
Cardless at ms_webinar
Cardless at ms_webinarCardless at ms_webinar
Cardless at ms_webinarkahunaworld
 
Digitisation in Banking sector
Digitisation in Banking sectorDigitisation in Banking sector
Digitisation in Banking sectorHimanshu Agarwal
 
nonClonableID™ for the Banking Domain
nonClonableID™ for the Banking DomainnonClonableID™ for the Banking Domain
nonClonableID™ for the Banking DomainBilcareltd
 
India Stack - Social Impact at Scale
India Stack - Social Impact at ScaleIndia Stack - Social Impact at Scale
India Stack - Social Impact at ScaleAmit Ranjan
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentKona Software Lab Limited.
 

What's hot (19)

E banking security
E banking securityE banking security
E banking security
 
E banking & security
E banking & securityE banking & security
E banking & security
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
K cps datasheet
K cps datasheetK cps datasheet
K cps datasheet
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
PPT eBanking
PPT eBankingPPT eBanking
PPT eBanking
 
Digital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by NetceteraDigital Payment and 3-D Secure by Netcetera
Digital Payment and 3-D Secure by Netcetera
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Cardless and contactless transactions
Cardless and contactless transactionsCardless and contactless transactions
Cardless and contactless transactions
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Cardless at ms_webinar
Cardless at ms_webinarCardless at ms_webinar
Cardless at ms_webinar
 
Digitisation in Banking sector
Digitisation in Banking sectorDigitisation in Banking sector
Digitisation in Banking sector
 
nonClonableID™ for the Banking Domain
nonClonableID™ for the Banking DomainnonClonableID™ for the Banking Domain
nonClonableID™ for the Banking Domain
 
India Stack - Social Impact at Scale
India Stack - Social Impact at ScaleIndia Stack - Social Impact at Scale
India Stack - Social Impact at Scale
 
TokenID introduction
TokenID introductionTokenID introduction
TokenID introduction
 
Internet banking.
Internet banking.Internet banking.
Internet banking.
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc payment
 

Similar to The achilles heel of GPN Card implementation

Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bankSteve Sidner
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptxLameesAnees
 
Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...
Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...
Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...Smart Payment Association
 
Project proto
Project protoProject proto
Project protoRaja Asr
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital PaymentsSantosh Potadar
 
Money pad,the future wallet
Money pad,the future walletMoney pad,the future wallet
Money pad,the future walletSmitakshi Sen
 
Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos Bank Alfalah Limited
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card PaymentEditor IJCATR
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cEtheralabs
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)IAESIJEECS
 
Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1Kelvin Tai
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
 

Similar to The achilles heel of GPN Card implementation (20)

Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...
Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...
Contactless Card Shipments Jump enabling Shoppers Take Advantage of Everyday ...
 
Project proto
Project protoProject proto
Project proto
 
Moneypad
MoneypadMoneypad
Moneypad
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
 
Money pad,the future wallet
Money pad,the future walletMoney pad,the future wallet
Money pad,the future wallet
 
Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos Low cost 3d authentication service for atm and pos
Low cost 3d authentication service for atm and pos
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
EMV and Smartcards
EMV and SmartcardsEMV and Smartcards
EMV and Smartcards
 
Emv and smartcards
Emv and smartcardsEmv and smartcards
Emv and smartcards
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8c
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)
 
Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1Visa master card contactless payment in china_v1
Visa master card contactless payment in china_v1
 
KentPay
KentPayKentPay
KentPay
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 

More from idsecconf

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfidsecconf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...idsecconf
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfidsecconf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfidsecconf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...idsecconf
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfidsecconf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidadaidsecconf
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullahidsecconf
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaidsecconf
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwiantoidsecconf
 

More from idsecconf (20)

idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
 
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
 
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
 
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdfAli - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
 
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
 
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdfRama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdfNosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
 
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
 
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdfUtian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika TriwidadaPerkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
 
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - AbdullahPentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
 
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabellaHacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi DwiantoDevsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
 

Recently uploaded

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 

Recently uploaded (20)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 

The achilles heel of GPN Card implementation

  • 1. The Achilles Heel of GPN Card Implementation B. Noviansyah / @tintinnya Presented at IDSecConf 2020 12--13 December 2020
  • 2. What Does This Presentation All About ➢ Share my observation towards Gerbang Pembayaran Nasional (GPN) cards, focusing on the implementation flaw of Chip-based ATM/Debit Card with NSICCS (National Standard Indonesia Chip Card Specification) Applet that is derived from EMV Standard ➢ I will not share the full detail, since the impact is still major, affecting millions of users. But the trends are decreasing near the migration deadline ➢ Suggests what should Card Issuers do towards this finding to protect users from similar threats ➢ Suggest what should we as customers do towards this finding to protect our own money and account 2 GPN Logo from www.bi.go.id
  • 3. Hello, I am TinTin Been there, done that ★ Java EE Programmer since 2002 ○ Tab Person ○ K&R with 1TBS ★ Internal Pentester ★ Information Security Policy maker ★ Enterprise Security Architect ★ Digital Forensics ○ Host-based forensics: Image Acquisition with dcfldd, DumpIt, Tableau ○ Cloud-based forensics: Image Acquisition with gsutil ○ Analyze image with TSK, autopsy ★ Blockchain Enthusiast ○ Solidity on Private Ethereum on Ubuntu ★ Advisor of Information Security for Payment System and FinTech 3 Formal, Professional Ed, and Certification ★ Teknik Informatika Institut Teknologi Bandung ○ Sistem Terdistribusi ★ Heinz College Carnegie Mellon University ○ Master of Science in Information Security Policy and Management ○ Cyber Forensics and Incident Response (CyFIR) Track ○ Chief of Information Security Officer (CISO) Executive Education Certificate ★ Certification: ○ EC-Council’s CEH v4.1 ○ EXIN’s ITIL Foundation v2 ○ SGS’ ISO 20000 LA
  • 4. 4 ★ Payment Systems are closer than we thought. ★ One of the instruments in Payment Systems is Card-based Payment Instrument. ★ Migration of Magstripe to Chip as Part of Security Control. But How secure is Chip-based Payment Card? ★ To see the magnitude of impact when chip-based implemented and distributed to the public Why Did I Choose This Topic?
  • 5. Card-based Payment System Instrument in Blueprint 5 Blueprint Sistem Pembayaran Indonesia 2025, 28 November 2019
  • 6. One of the Problems with Payment Card 6 https://nasional.tempo.co/read/680461/sepertiga-kasus-skimming-di-duni a-terjadi-di-indonesia/full&view=ok https://www.beritasatu.com/faisal-maliki-baskoro/ekonomi/269376/bank-i ndonesia-jumlah-fraud-terus-menurun “From the last 3 years, there are 5,500 skimming case in the world. And 1,549 cases happened in Indonesia.” ~Brigjen Victor E. Simanjuntak, Director of Economic and Special Crime, Criminal Investigation Agency of Indonesian Police Force, July 2nd, 2015~ “Indonesia is still in the lowest position for banking crime rates since 2012 compared to other Southeast Asian countries. From 2014 and until February 2015, card-based fraud only 0.0008% of total amount transaction” ~Eni V Panggabean, Head of Payment System Policy and Supervision Department, Bank Indonesia, April 28th, 2015~ In 2010, Fraud amount was IDR 55 billion In 2015, Fraud amount was IDR 33 billion What about now in 2020?
  • 7. Understanding the Impact: Card Growth 7 Source: Bank Indonesia’s Payment System Statistics https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/jumlah%20apmk%20beredar.aspx
  • 8. Understanding the Impact: Amount and Volume ATM/D Card 8 Source: Bank Indonesia’s Payment System Statistics https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/transaksi.aspx
  • 9. Understanding the Impact: Amount and Volume Credit Card 9 Source: Bank Indonesia’s Payment System Statistics https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/transaksi.aspx
  • 10. Understanding the Impact: Infrastructure 10 Source: Bank Indonesia’s Payment System Statistics https://www.bi.go.id/id/statistik/sistem-pembayaran/apmk/contents/infrastrukturapmk.aspx
  • 11. Understanding the Impact: Bank Indonesia’s Licensee 11 116 Total Financial Institutions 75 Total Issuer ATM/D Card 23 Total Acquirer D Card 26 Total Issuer CC 17 Total Acquirer CC 34 Total Issuer ATM Card
  • 12. Infrastructures: ATMs: ~105 thousands EDCs: ~1,4 millions Merchants: ~ 906 thousands Understanding the Impact: TL;DR 12 Cards: ATM/D Cards: ~200 millions Credit Cards: ~18 millions ATM Cards: ~ 10 millions ATM/D Transactions: Total Transactions: 565 millions Total Amount: ~IDR 580 trillion CC Transactions: Total Transactions: 22 millions Total Amount: ~IDR 18 trillion To roll-out security enhancement or migration, it is like moving an elephant
  • 13. ★ Card Present (CP) Transaction, both with Magstripe and Chip ★ Linkage between NSICCS and EMV ★ Contact-based card ISO7816 ★ ATM/Debit Cards Only ★ Interaction between chip and Terminal 13 Focus of This Presentation
  • 14. ★ Card Not Present (CNP) Transaction, such as online transaction ★ EMV on Credit Cards ★ Contactless Cards ISO14443 ★ Communication between Terminal and Host 14 Will not be the Focus of This Presentation
  • 15. How Do Cards Interact With Bank’s Back-end? 15 ...and Skimmers are sitting there in the card slot, reading and copying the data from magstripe, or tampering the EDC and stored it in malicious chip inside the EDC.
  • 16. What Make Skimmers Win Your Money? Your Card Your PIN: pinhole camera and/or overlayed PIN pad 16 https://www.boredpanda.com/how-to-spot-atm-scam/ Your Card data and your PIN were sold to online forum. Buyer can write the data into a different magstripe card and use the PIN to withdraw your money
  • 17. Chip-based Card to Reduce Skimming Fraud 17 https://blog.tdecu.org/why-are-chip-cards-more-secure-than-swiping https://squareup.com/us/en/townsquare/why-are-chip-cards-more-se cure-than-magnetic-stripe-cards Image from: https://squareup.com/us/en/hardware/contactless-chip-reader
  • 18. Chip-based Card to Reduce Skimming Fraud 18 https://www.thalesgroup.com/en/markets/digital-identity-and-security /banking-payment/cards/emv/about https://www.vice.com/en/article/mgbm7p/why-chip-cr edit-cards-are-more-secure-than-magnetic-stripes
  • 19. Banks Urge Customers To Migrate Their Magstripe Card 19 https://www.bbc.com/indonesia/indonesia-43486801 https://finance.detik.com/bursa-dan-valas/d-3874531/gratis- migrasi-kartu-atm-jadi-pakai-chip https://www.liputan6.com/bisnis/read/3939518/biar-aman-dir ut-bca-minta-nasabah-segera-migrasi-ke-teknologi-chip https://finance.detik.com/bursa-dan-valas/d-3874 329/kartu-atm-belum-pakai-chip-ini-risikonya https://www.liputan6.com/bisnis/read/3502530/bri-imbau-n asabahnya-segera-migrasi-kartu-atm-ke-teknologi-chipBank Indonesia circulated Letter Nr. 17/52/DKSP dated Dec 30th, 2015 and set the deadline of 100% migration from Magstripe Card to Chip-based Card on Jan 1st, 2022
  • 20. ...but Banks Still Allowed to Issued Magstripe Card. 20 Surat Edaran No.17/52/DKSP Tanggal 30 Desember 2015 Implementasi Standar Nasional Teknologi Chip dan Penggunaan Personal Identification Number Online 6 (Enam) Digit untuk Kartu ATM dan/atau Kartu Debet yang Diterbitkan di Indonesia Only for Account with maximum balance of IDR 5 million, with proper risk management from Bank Issuer
  • 21. Luckily, The Cards Could Not Be Used Overseas, Right? 21 https://finance.detik.com/moneter/d-4143357/baru-terbit-gpn-tidak-bi sa-dipakai-di-luar-negeri https://www.republika.co.id/berita/ekonomi/keuangan/18/07/30/pcog zj370-kartu-berlogo-gpn-belum-bisa-dipakai-di-luar-negeri https://www.liputan6.com/bisnis/read/3587012/alasan-kartu-debet-gp n-belum-bisa-dipakai-di-luar-negeri GPN Card optimizes for domestics transaction. Customers could ask Visa/MasterCard for overseas transaction purpose https://ekonomi.kompas.com/read/2018/04/16/193000726/seperti-jc b-dan-unionpay-bisakah-gpn-dipakai-untuk-transaksi-di-luar-negeri-?pa ge=all
  • 22. ★ Does GPN Card with NSICCS applet able to protect us as customers from counterfeited card created by international skimmer syndicate and being used to perform unauthorized transactions (e.g. withdrawal)? 22 Problem Statement
  • 23. Bank Indonesia has set National Standard Indonesian Chip Card Specification (NSICCS) as the country’s technology benchmark for ATMs and debit cards of all card providers across the country. All cards should be migrated 100% 1 January 2022 at the latest. The (Zero-knowledge) Observations Which EMV version is adopted by NSICCS for GPN? 23 https://www.thejakartapost.com/news/2017/06/22/bank-indonesia-set s-chip-technology-standard-for-atms-debit-cards.html
  • 24. APDU: TLV (Tag Length Value) No NSICCS Book, just EMV 4.1 Books 1--3 The NSICCS Observations thru EMV 4.1 Books 24
  • 25. What Do You Need To Read the Card 1. Hardware: a. Smartcard Reader and Magstripe Reader/Writer 25 2. Software: a. Python Libraries to communicate with USB Smartcard b. DLL and x86 application for read write
  • 26. Reading the Card PSE (Payment System Environment) 26 MasterCards from Bank B has NSICCS Applet as Priority #1 over DEBIT MASTERCARD Applet
  • 27. Reading the Card 27 Enumerating Available AIDs GPN Cards have Visa Applet, except GPN Card from Bank A Visa Cards and MasterCards have NSICCS Applet If GPN Card has Visa Applet, does it means that this card can be processed by Non-NSICCS Terminal? Let alone the routing of BIN could not be found by Visa Principal This is false positive, since old AIDs of Global Platform “borrowed” 5 bytes from VISA’s AID.
  • 28. Findings: Card Properties 28 ⭕= n/a, 🛑 = Not Supported, * = Using AID Enumeration, not with PSE Some cards are only support SDA, not DDA. SDA (Static Data Authentication) is the less secure compare with DDA (Dynamic Data Authentication)
  • 29. Findings: EMV Tag can be easily read. No Encryption scrambled or protected it 29 EMV chip-based card is not protecting the data inside the card from being copied. Instead, EMV chip-card serves as a mini computer to conduct APPLICATION CRYPTOGRAM calculation to generate dynamic data and send along with the transaction information to ISSUER HOST. This authentication process makes EMV card is more secure than magstripe card.
  • 30. This finding is exploited by copying the data from EMV tag to Magstripe, with certain modification. The results were surprising. Findings: One Bank has EMV Tag similars with Magstripe Data(!) 30
  • 31. 1. Testcase: a. Modify data from EMV Tag, and write it on magstripe with 4 scenarios of cash withdrawal b. On-Us ATM EMV, On-Us ATM Magstripe, On-Us EDC c. Off-Us ATM EMV, Off-Us ATM Magstring, Off-Us EDC d. There are 4 scenarios tested on 6 types of terminals. Not all tested banks have these terminal types 2. Results: a. Most of cash withdrawal test cases are successfully executed on the Off-Us terminals b. Data from magstripe basically discourage EDC to read it, hence some tag need to be replaced i. Some banks not check the integrity of data in the back end. They just simply rely on logics in terminal (ATM/EDC) ii. Some banks only rely on EDC to prevent card being used based on certain tags iii. Some banks only rely on EDC to prevent card being used based on BIN. The EDC still has FALLBACK mechanism to accept magstripe instead of chip Developed Test Cases and Results 31
  • 32. Findings: Recaps 1. Data in EMV chip is not encrypted, and can be read within < 1s 2. One Bank’s GPN Card has similar data between EMV and Magstripe 3. Most of cash withdrawal use cases using copied card are successfully executed on the Off-Us terminals 4. Data from magstripe basically discourage EDC to read it, hence some tag need to be replaced a. Some banks not check the integrity of data in the back end b. Some banks only rely on EDC to prevent data, based on certain part c. Some banks only rely on EDC to prevent data based on BIN 5. GPN cards still have VISA/MasterCard applet 6. VISA/MasterCard Cards still have GPN applet 7. Above modifications are still requiring valid PIN. 32
  • 33. ★ As long as magstripe still co-exists with EMV Chip, there’s still a chance for GPN card users become victim of card shimming and/or card skimming. This is also applies with VISA/Mastercard. ★ This is not a final conclusion, since only 6 issuers bank that were tested. There are 75 licensees, and 6 are not enough to represent these. 33 Answering Problem Statements
  • 34. Customers: Stay Vigilant: Skimmer still targeting your magstripe 34 Source: Pixabay.com
  • 35. Customers: Stay Vigilant: Shimming Devices Targeting your Chip 35 Source: https://krebsonsecurity.com/2015/08/chip-card-atm-shimmer-found-in-mexico/ https://krebsonsecurity.com/2017/01/atm-shimmers-target-chip-based-cards/
  • 36. Banks: Increase your visibility 36 Check your back-end. Data integrity verification is a must. Do not simply rely on data: “PIN and Card are valid” without supported by auxiliaries data, e.g. CCTV, pattern of customers movement
  • 37. Standard Body and Central Bank: Increase security level of the standard 37 Evaluates and Enhanced the standard. Attacking SDA Card already available on the Internet. Enforce a comprehensive risk management towards GPN Card Implementation, that include risk assessment in Chip and Magstripe