SlideShare a Scribd company logo
Cybersecurity Vulnerabilities in
Mobile Fare Payment Applications:
A Case Study
Kevin Dennis, Maxat Alibayev, Sean J. Barbeau, and Jay Ligatti
Center for Urban Transportation Research and the Department of Computer Science and Engineering
University of South Florida
Introduction and Motivation
 Cybersecurity is a significant concern across all industries
 Many high-profile attacks have been reported:
• Ransomware attacks in Atlanta ($2.6 million)
• Equifax data breach (over $1.4 billion)
 Transportation is no exception:
• Colorado Department of Transportation shut down 2,000
employee computers due to SamSam ransomware
2/20
Introduction and Motivation
 This presentation introduces a new vulnerability discovered
in a mobile fare payment application deployed in Florida
 This vulnerability could have possibly impacted up to 1.5
million users across 40 cities
 While patched quickly, this incident revealed that public-
facing policies for vulnerability disclosure are lacking
3/20
Background
 The vulnerability investigation was informed
by a literature review conducted in 2018
 The literature review examined various
technologies deployed in Florida, including
mobile fare payment applications and
electronic ticketing
 The literature review and corresponding
survey showed that 64% of Florida agencies
have deployed mobile fare payment
applications
4/20
Mobile Fare Payment and Ticketing Systems
 Mobile fare payment is a form of contactless
electronic ticketing
• Enables riders to purchase a ticket and validate
the purchase using their mobile device
 Mobile fare payment may reduce
production and cash‐handling costs
 Some mobile fare payment apps integrate
trip planning and real‐time information
5/20
Methodology
6/20
Application Programming Interface (API) Call
7/20
Vulnerability Description
3. The attacker sends the modified request.
4. The server validates the new credentials
without verifying the user ID. The victim’s
information is then sent to the attacker
and can be viewed directly or forwarded
to the mobile device.
No rider
history
exists for
attacker
1. The attacker captures valid credentials
for a session by creating their own
account.
2. The user ID in the valid request is
modified by the attacker.
8/20
Exploited Application
 Compromised Data:
• Name
• Phone number
• Last 4 digits of credit card
• Parking location and time
• License plate number
 The targeted account
belonged to the research
team Compromised research team
transit account
Compromised research team
parking account
9/20
Affected Multiple Organizations
 The application vendor also
publishes applications for
parking services
 The same API is used to serve
data for both applications
 An attacker can retrieve
private information for users
of either application
10/20
Impacted Users
 May have impacted customers
in as many as 40 cities if the
vulnerability was present in all
versions
 If vulnerable, an estimated
1,554,000 users may have been
exposed 580,000
959,000
0
200,000
400,000
600,000
800,000
1,000,000
1,200,000
1,400,000
1,600,000
Number of impacted users
Number of users potentially impacted by the
getParkerHistory API vulnerability
MyJTA app Passport Parking main app Other Passport whitelabeled apps
11/20
Vulnerability Disclosure Process
 The research team reported the vulnerability to a personal
contact at the agency
 The vulnerability was patched within 4 weeks
Vulnerability
discovered
Early October
Vulnerability report
sent to transit agency
October 30th
Vulnerability patched
by vendor
Early December
12/20
Improving the Vulnerability Disclosure Process
 Problems encountered during the process:
• No point of contact available for vendor or agency
• No clear guidelines or process for disclosing the vulnerability
• No notification was provided about the vulnerability’s
resolution
 A brief review of other Florida transit agencies and their
vendors did not find any publicly-available responsible
disclosure processes
13/20
Implications for Transit Agencies
 Discuss with your vendors how vulnerabilities are addressed
• Does the vendor have a plan?
• Will you be charged?
• Do they inform users of breaches?
• Do they inform agencies of breaches?
• Do they conduct independent security audits?
 The research team is discussing new policy guidelines with FDOT
that may address:
• Above issues in agency contracts with vendors
• Agency disclosure to riders
14/20
Discussion
 Publicly available vulnerability disclosure policies may allow vulnerabilities to
be quickly patched and improve communication between agencies,
researchers, and vendors
 Safety requirements may provide starting point for introducing cybersecurity
requirements
• Many processes, such as vulnerability disclosure and safety reporting, may be very similar
 Potential requirements include:
• Standards for data encryption
• Publicly available vulnerability disclosure policies and contacts
• Notification of affected parties, including customers, other agencies, and vendors
• Audits and cybersecurity employee education
15/20
Recommendations for Agencies
 Follow best-practice recommendations for mitigating vulnerabilities
• Review existing policies and procedures
• Use secure authentication and encryption
• Log access to sensitive infrastructure
• Backup critical data in case of ransomware
 Identify opportunities to improve employee training
 Create vulnerability disclosure process (internal and external)
 Track and report metrics (e.g., incidents)
 Review and comply with state and federal requirements in case of data
breach
 Participate in information exchange with peers
16/20
Recommendations for DOTs
 Quantify and track metrics for cybersecurity incidents from agencies
 Offer resources to improve training and funding opportunities
• These are the top two agency-reported challenges for better
cybersecurity
 Consider incorporating cybersecurity into or alongside existing safety
and security assessments
17/20
Conclusions
 Cybersecurity is a significant concern across all industries and
should be a top priority of transit agencies and FDOT
 Lack of training and funding were top cited challenges by agencies
for improved cybersecurity
 Risks and improvements should be reported and, when possible,
measured to assist with resource allocation and to track efforts to
improve cybersecurity
 Many avenues for attack on existing transit systems require
additional analysis
• Existing vulnerabilities were identified for most technologies
18/20
Acknowledgements
 This paper is part of the project BDV25-977-51 “Enhancing Cybersecurity
in Public Transportation”
 Funded by the Florida Department of Transportation and supported by
the National Center for Transit Research, a program of the Center for
Urban Transportation Research at the University of South Florida
 The opinions, findings and conclusions expressed in this publication are
those of the author(s) and not necessarily those of the Florida
Department of Transportation or the U.S. Department of Transportation
 The authors would like to thank Gabrielle Matthews for serving as the
FDOT project manager
19/20
Thank You!
Kevin Dennis
kevindennis@mail.usf.edu
20
Sean J. Barbeau
barbeau@usf.edu
Jay Ligatti
ligatti@usf.edu

More Related Content

What's hot

Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...
Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...
Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...Susan Shaheen
 
Lessons Learned in Transit Efficiencies, Revenue Generation, and Cost Reductions
Lessons Learned in Transit Efficiencies, Revenue Generation, and Cost ReductionsLessons Learned in Transit Efficiencies, Revenue Generation, and Cost Reductions
Lessons Learned in Transit Efficiencies, Revenue Generation, and Cost ReductionsNew York Public Transit Association
 
San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...
San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...
San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...SanFranciscoTA
 
Current trends and innovations 5310 program and mod sandbox overview
Current trends and innovations 5310 program and mod sandbox overviewCurrent trends and innovations 5310 program and mod sandbox overview
Current trends and innovations 5310 program and mod sandbox overviewCHCRPA
 
Achieving Safety Results by Addressing Behavioral Issues
Achieving Safety Results by Addressing Behavioral IssuesAchieving Safety Results by Addressing Behavioral Issues
Achieving Safety Results by Addressing Behavioral IssuesRPO America
 
Dubuque Smarter Travel
Dubuque Smarter TravelDubuque Smarter Travel
Dubuque Smarter TravelRPO America
 
Digital Vision for CALP
Digital Vision for CALPDigital Vision for CALP
Digital Vision for CALPtaipida
 
Assessment of pedestrian accessibility and prioritization of future improvements
Assessment of pedestrian accessibility and prioritization of future improvementsAssessment of pedestrian accessibility and prioritization of future improvements
Assessment of pedestrian accessibility and prioritization of future improvementsEnvironmental Design Research Association
 
2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...
2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...
2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...Sean Barbeau
 
Mobility and Management & Economic Development in Southeast Idaho
Mobility and Management & Economic Development in Southeast IdahoMobility and Management & Economic Development in Southeast Idaho
Mobility and Management & Economic Development in Southeast IdahoRPO America
 
How open data are turned into services?
How open data are turned into services?How open data are turned into services?
How open data are turned into services?Slim Turki, Dr.
 
U.S. 33 Smart Mobility Corridor
U.S. 33 Smart Mobility CorridorU.S. 33 Smart Mobility Corridor
U.S. 33 Smart Mobility CorridorRPO America
 
Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...
Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...
Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...Smart Commute
 
Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...
Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...
Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...Smart Commute
 

What's hot (20)

Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...
Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...
Shared Mobility: Reshaping America's Travel Patterns Keynote Speech at Nation...
 
Lessons Learned in Transit Efficiencies, Revenue Generation, and Cost Reductions
Lessons Learned in Transit Efficiencies, Revenue Generation, and Cost ReductionsLessons Learned in Transit Efficiencies, Revenue Generation, and Cost Reductions
Lessons Learned in Transit Efficiencies, Revenue Generation, and Cost Reductions
 
San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...
San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...
San Francisco Mobility Access and Pricing Study: Study Findings and Public Fe...
 
Current trends and innovations 5310 program and mod sandbox overview
Current trends and innovations 5310 program and mod sandbox overviewCurrent trends and innovations 5310 program and mod sandbox overview
Current trends and innovations 5310 program and mod sandbox overview
 
Achieving Safety Results by Addressing Behavioral Issues
Achieving Safety Results by Addressing Behavioral IssuesAchieving Safety Results by Addressing Behavioral Issues
Achieving Safety Results by Addressing Behavioral Issues
 
Dubuque Smarter Travel
Dubuque Smarter TravelDubuque Smarter Travel
Dubuque Smarter Travel
 
Digital Vision for CALP
Digital Vision for CALPDigital Vision for CALP
Digital Vision for CALP
 
Assessment of pedestrian accessibility and prioritization of future improvements
Assessment of pedestrian accessibility and prioritization of future improvementsAssessment of pedestrian accessibility and prioritization of future improvements
Assessment of pedestrian accessibility and prioritization of future improvements
 
Citizen engagement final project submission
Citizen engagement final project submissionCitizen engagement final project submission
Citizen engagement final project submission
 
Sharing_the_Road
Sharing_the_RoadSharing_the_Road
Sharing_the_Road
 
Need, mobility poverty, and environmental justice
Need, mobility poverty, and environmental justiceNeed, mobility poverty, and environmental justice
Need, mobility poverty, and environmental justice
 
Survey
SurveySurvey
Survey
 
Survey
SurveySurvey
Survey
 
2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...
2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...
2013 UTC Southeast - OneBusAway – Sharing real time transit information via o...
 
Mobility and Management & Economic Development in Southeast Idaho
Mobility and Management & Economic Development in Southeast IdahoMobility and Management & Economic Development in Southeast Idaho
Mobility and Management & Economic Development in Southeast Idaho
 
How open data are turned into services?
How open data are turned into services?How open data are turned into services?
How open data are turned into services?
 
U.S. 33 Smart Mobility Corridor
U.S. 33 Smart Mobility CorridorU.S. 33 Smart Mobility Corridor
U.S. 33 Smart Mobility Corridor
 
Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...
Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...
Smart Commute Initiative: Implementing a Regional Workplace-based TDM Program...
 
Behaviour Change - Smarter Choices Theory and Practice
Behaviour Change - Smarter Choices Theory and PracticeBehaviour Change - Smarter Choices Theory and Practice
Behaviour Change - Smarter Choices Theory and Practice
 
Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...
Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...
Smart Commute Initiative: Establishment of a Multijurisdictional Workplace-ba...
 

Similar to TRB 2020 - Cybersecurity Vulnerabilities in Mobile Fare Payment Applications: A Case Study

2019 FPTA - Enhancing Cybersecurity in Public Transportation
2019 FPTA - Enhancing Cybersecurity in Public Transportation2019 FPTA - Enhancing Cybersecurity in Public Transportation
2019 FPTA - Enhancing Cybersecurity in Public TransportationSean Barbeau
 
Enhancing Cybersecurity in Public Transportation
Enhancing Cybersecurity in Public TransportationEnhancing Cybersecurity in Public Transportation
Enhancing Cybersecurity in Public TransportationSean Barbeau
 
Utah Interactive 2014 Report
Utah Interactive 2014 ReportUtah Interactive 2014 Report
Utah Interactive 2014 ReportNIC Inc | EGOV
 
Hp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reedHp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reedSatya Harish
 
Yasmin - sum.intern - review 2 ppt.pptx
Yasmin - sum.intern - review 2  ppt.pptxYasmin - sum.intern - review 2  ppt.pptx
Yasmin - sum.intern - review 2 ppt.pptxLuminaRajasekeran
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
UWProjectHandoffReport
UWProjectHandoffReportUWProjectHandoffReport
UWProjectHandoffReportJill Schulze
 
Digital Platforms: an analytical framework for identifying and evaluating pol...
Digital Platforms: an analytical framework for identifying and evaluating pol...Digital Platforms: an analytical framework for identifying and evaluating pol...
Digital Platforms: an analytical framework for identifying and evaluating pol...panooren
 
Responsible Digital Credit Webinar
Responsible Digital Credit Webinar Responsible Digital Credit Webinar
Responsible Digital Credit Webinar John Owens
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
2015 WACHA Hot Regulatory Exam Issues 03202015
2015 WACHA Hot Regulatory Exam Issues 032020152015 WACHA Hot Regulatory Exam Issues 03202015
2015 WACHA Hot Regulatory Exam Issues 03202015Brent Siegel
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Depository Trust & Clearing Corporation Shared Assessments Case Study
Depository Trust & Clearing Corporation Shared Assessments Case StudyDepository Trust & Clearing Corporation Shared Assessments Case Study
Depository Trust & Clearing Corporation Shared Assessments Case StudyKen Peterson
 
So near yet so far - why utilities need to re-energize their digital customer...
So near yet so far - why utilities need to re-energize their digital customer...So near yet so far - why utilities need to re-energize their digital customer...
So near yet so far - why utilities need to re-energize their digital customer...Rick Bouter
 
Why Utilities Need to Re-energize Their Digital Customer Experience
Why Utilities Need to Re-energize Their  Digital Customer ExperienceWhy Utilities Need to Re-energize Their  Digital Customer Experience
Why Utilities Need to Re-energize Their Digital Customer Experiencedefault default
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeRichard Austin
 
So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...
So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...
So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...Capgemini
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealMaynooth University
 

Similar to TRB 2020 - Cybersecurity Vulnerabilities in Mobile Fare Payment Applications: A Case Study (20)

2019 FPTA - Enhancing Cybersecurity in Public Transportation
2019 FPTA - Enhancing Cybersecurity in Public Transportation2019 FPTA - Enhancing Cybersecurity in Public Transportation
2019 FPTA - Enhancing Cybersecurity in Public Transportation
 
Enhancing Cybersecurity in Public Transportation
Enhancing Cybersecurity in Public TransportationEnhancing Cybersecurity in Public Transportation
Enhancing Cybersecurity in Public Transportation
 
Utah Interactive 2014 Report
Utah Interactive 2014 ReportUtah Interactive 2014 Report
Utah Interactive 2014 Report
 
Hp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reedHp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reed
 
Yasmin - sum.intern - review 2 ppt.pptx
Yasmin - sum.intern - review 2  ppt.pptxYasmin - sum.intern - review 2  ppt.pptx
Yasmin - sum.intern - review 2 ppt.pptx
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
UWProjectHandoffReport
UWProjectHandoffReportUWProjectHandoffReport
UWProjectHandoffReport
 
Webinar Next Week: Beyond Online Intake: Looking at Triage and Expert Systems
Webinar Next Week:  Beyond Online Intake: Looking at Triage and Expert SystemsWebinar Next Week:  Beyond Online Intake: Looking at Triage and Expert Systems
Webinar Next Week: Beyond Online Intake: Looking at Triage and Expert Systems
 
Digital Platforms: an analytical framework for identifying and evaluating pol...
Digital Platforms: an analytical framework for identifying and evaluating pol...Digital Platforms: an analytical framework for identifying and evaluating pol...
Digital Platforms: an analytical framework for identifying and evaluating pol...
 
EPAR_UW_324_DFS Consumer Protection_3.31.16
EPAR_UW_324_DFS Consumer Protection_3.31.16EPAR_UW_324_DFS Consumer Protection_3.31.16
EPAR_UW_324_DFS Consumer Protection_3.31.16
 
Responsible Digital Credit Webinar
Responsible Digital Credit Webinar Responsible Digital Credit Webinar
Responsible Digital Credit Webinar
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
2015 WACHA Hot Regulatory Exam Issues 03202015
2015 WACHA Hot Regulatory Exam Issues 032020152015 WACHA Hot Regulatory Exam Issues 03202015
2015 WACHA Hot Regulatory Exam Issues 03202015
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Depository Trust & Clearing Corporation Shared Assessments Case Study
Depository Trust & Clearing Corporation Shared Assessments Case StudyDepository Trust & Clearing Corporation Shared Assessments Case Study
Depository Trust & Clearing Corporation Shared Assessments Case Study
 
So near yet so far - why utilities need to re-energize their digital customer...
So near yet so far - why utilities need to re-energize their digital customer...So near yet so far - why utilities need to re-energize their digital customer...
So near yet so far - why utilities need to re-energize their digital customer...
 
Why Utilities Need to Re-energize Their Digital Customer Experience
Why Utilities Need to Re-energize Their  Digital Customer ExperienceWhy Utilities Need to Re-energize Their  Digital Customer Experience
Why Utilities Need to Re-energize Their Digital Customer Experience
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital Age
 
So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...
So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...
So Near Yet so Far: Why Utilities Need to Re-energize Their Digital Customer ...
 
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDealQuality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
Quality of Claim Metrics in Social Sensing Systems: A case study on IranDeal
 

More from Sean Barbeau

OneBusAway Android - 2020 Update
OneBusAway Android - 2020 UpdateOneBusAway Android - 2020 Update
OneBusAway Android - 2020 UpdateSean Barbeau
 
Improving the quality and cost effectiveness of multimodal travel behavior da...
Improving the quality and cost effectiveness of multimodal travel behavior da...Improving the quality and cost effectiveness of multimodal travel behavior da...
Improving the quality and cost effectiveness of multimodal travel behavior da...Sean Barbeau
 
Work Zone Data Exchange (WZDx) format
Work Zone Data Exchange (WZDx) formatWork Zone Data Exchange (WZDx) format
Work Zone Data Exchange (WZDx) formatSean Barbeau
 
Why Open-source Software?
Why Open-source Software?Why Open-source Software?
Why Open-source Software?Sean Barbeau
 
OneBusAway - An open-source platform for Mobility as a Service
OneBusAway - An open-source platform for Mobility as a ServiceOneBusAway - An open-source platform for Mobility as a Service
OneBusAway - An open-source platform for Mobility as a ServiceSean Barbeau
 
Fare payment in OneBusAway
Fare payment in OneBusAwayFare payment in OneBusAway
Fare payment in OneBusAwaySean Barbeau
 
Open-source Transit Software
Open-source Transit SoftwareOpen-source Transit Software
Open-source Transit SoftwareSean Barbeau
 
GTFS-realtime v2.0
GTFS-realtime v2.0GTFS-realtime v2.0
GTFS-realtime v2.0Sean Barbeau
 
NTI 2017 Workshop - Many Uses of GTFS Data
NTI 2017 Workshop - Many Uses of GTFS DataNTI 2017 Workshop - Many Uses of GTFS Data
NTI 2017 Workshop - Many Uses of GTFS DataSean Barbeau
 
2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...
2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...
2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...Sean Barbeau
 
Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...
Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...
Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...Sean Barbeau
 
OneBusAway - New issue reporting flow in OneBusAway Android
OneBusAway - New issue reporting flow in OneBusAway AndroidOneBusAway - New issue reporting flow in OneBusAway Android
OneBusAway - New issue reporting flow in OneBusAway AndroidSean Barbeau
 
Closing the Loop - Improving Transit through Crowd-sourced Information
Closing the Loop - Improving Transit through Crowd-sourced InformationClosing the Loop - Improving Transit through Crowd-sourced Information
Closing the Loop - Improving Transit through Crowd-sourced InformationSean Barbeau
 
2016 Commuter Choice Summit - TDM Technology Session
2016 Commuter Choice Summit - TDM Technology Session2016 Commuter Choice Summit - TDM Technology Session
2016 Commuter Choice Summit - TDM Technology SessionSean Barbeau
 
Adding New Agencies to OneBusAway Tampa
Adding New Agencies to OneBusAway TampaAdding New Agencies to OneBusAway Tampa
Adding New Agencies to OneBusAway TampaSean Barbeau
 
GTFS Maintenance & More
GTFS Maintenance & MoreGTFS Maintenance & More
GTFS Maintenance & MoreSean Barbeau
 
2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...
2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...
2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...Sean Barbeau
 
OneBusAway - Issue reporting - Challenges and Improvements
OneBusAway - Issue reporting - Challenges and ImprovementsOneBusAway - Issue reporting - Challenges and Improvements
OneBusAway - Issue reporting - Challenges and ImprovementsSean Barbeau
 
USF Travel Options App
USF Travel Options AppUSF Travel Options App
USF Travel Options AppSean Barbeau
 

More from Sean Barbeau (20)

OneBusAway Android - 2020 Update
OneBusAway Android - 2020 UpdateOneBusAway Android - 2020 Update
OneBusAway Android - 2020 Update
 
Improving the quality and cost effectiveness of multimodal travel behavior da...
Improving the quality and cost effectiveness of multimodal travel behavior da...Improving the quality and cost effectiveness of multimodal travel behavior da...
Improving the quality and cost effectiveness of multimodal travel behavior da...
 
Work Zone Data Exchange (WZDx) format
Work Zone Data Exchange (WZDx) formatWork Zone Data Exchange (WZDx) format
Work Zone Data Exchange (WZDx) format
 
Why Open-source Software?
Why Open-source Software?Why Open-source Software?
Why Open-source Software?
 
OneBusAway - An open-source platform for Mobility as a Service
OneBusAway - An open-source platform for Mobility as a ServiceOneBusAway - An open-source platform for Mobility as a Service
OneBusAway - An open-source platform for Mobility as a Service
 
Fare payment in OneBusAway
Fare payment in OneBusAwayFare payment in OneBusAway
Fare payment in OneBusAway
 
Open-source Transit Software
Open-source Transit SoftwareOpen-source Transit Software
Open-source Transit Software
 
GTFS-realtime v2.0
GTFS-realtime v2.0GTFS-realtime v2.0
GTFS-realtime v2.0
 
NTI 2017 Workshop - Many Uses of GTFS Data
NTI 2017 Workshop - Many Uses of GTFS DataNTI 2017 Workshop - Many Uses of GTFS Data
NTI 2017 Workshop - Many Uses of GTFS Data
 
2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...
2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...
2017 SeeClickFix Workshop - Closing the Loop - Improving Transit through Crow...
 
USF Maps App
USF Maps AppUSF Maps App
USF Maps App
 
Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...
Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...
Opening the Door to Multimodal Applications - Creation, Maintenance, and Appl...
 
OneBusAway - New issue reporting flow in OneBusAway Android
OneBusAway - New issue reporting flow in OneBusAway AndroidOneBusAway - New issue reporting flow in OneBusAway Android
OneBusAway - New issue reporting flow in OneBusAway Android
 
Closing the Loop - Improving Transit through Crowd-sourced Information
Closing the Loop - Improving Transit through Crowd-sourced InformationClosing the Loop - Improving Transit through Crowd-sourced Information
Closing the Loop - Improving Transit through Crowd-sourced Information
 
2016 Commuter Choice Summit - TDM Technology Session
2016 Commuter Choice Summit - TDM Technology Session2016 Commuter Choice Summit - TDM Technology Session
2016 Commuter Choice Summit - TDM Technology Session
 
Adding New Agencies to OneBusAway Tampa
Adding New Agencies to OneBusAway TampaAdding New Agencies to OneBusAway Tampa
Adding New Agencies to OneBusAway Tampa
 
GTFS Maintenance & More
GTFS Maintenance & MoreGTFS Maintenance & More
GTFS Maintenance & More
 
2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...
2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...
2015 Transportation Research Forum Webinar - Enabling Better Mobility Through...
 
OneBusAway - Issue reporting - Challenges and Improvements
OneBusAway - Issue reporting - Challenges and ImprovementsOneBusAway - Issue reporting - Challenges and Improvements
OneBusAway - Issue reporting - Challenges and Improvements
 
USF Travel Options App
USF Travel Options AppUSF Travel Options App
USF Travel Options App
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

TRB 2020 - Cybersecurity Vulnerabilities in Mobile Fare Payment Applications: A Case Study

  • 1. Cybersecurity Vulnerabilities in Mobile Fare Payment Applications: A Case Study Kevin Dennis, Maxat Alibayev, Sean J. Barbeau, and Jay Ligatti Center for Urban Transportation Research and the Department of Computer Science and Engineering University of South Florida
  • 2. Introduction and Motivation  Cybersecurity is a significant concern across all industries  Many high-profile attacks have been reported: • Ransomware attacks in Atlanta ($2.6 million) • Equifax data breach (over $1.4 billion)  Transportation is no exception: • Colorado Department of Transportation shut down 2,000 employee computers due to SamSam ransomware 2/20
  • 3. Introduction and Motivation  This presentation introduces a new vulnerability discovered in a mobile fare payment application deployed in Florida  This vulnerability could have possibly impacted up to 1.5 million users across 40 cities  While patched quickly, this incident revealed that public- facing policies for vulnerability disclosure are lacking 3/20
  • 4. Background  The vulnerability investigation was informed by a literature review conducted in 2018  The literature review examined various technologies deployed in Florida, including mobile fare payment applications and electronic ticketing  The literature review and corresponding survey showed that 64% of Florida agencies have deployed mobile fare payment applications 4/20
  • 5. Mobile Fare Payment and Ticketing Systems  Mobile fare payment is a form of contactless electronic ticketing • Enables riders to purchase a ticket and validate the purchase using their mobile device  Mobile fare payment may reduce production and cash‐handling costs  Some mobile fare payment apps integrate trip planning and real‐time information 5/20
  • 8. Vulnerability Description 3. The attacker sends the modified request. 4. The server validates the new credentials without verifying the user ID. The victim’s information is then sent to the attacker and can be viewed directly or forwarded to the mobile device. No rider history exists for attacker 1. The attacker captures valid credentials for a session by creating their own account. 2. The user ID in the valid request is modified by the attacker. 8/20
  • 9. Exploited Application  Compromised Data: • Name • Phone number • Last 4 digits of credit card • Parking location and time • License plate number  The targeted account belonged to the research team Compromised research team transit account Compromised research team parking account 9/20
  • 10. Affected Multiple Organizations  The application vendor also publishes applications for parking services  The same API is used to serve data for both applications  An attacker can retrieve private information for users of either application 10/20
  • 11. Impacted Users  May have impacted customers in as many as 40 cities if the vulnerability was present in all versions  If vulnerable, an estimated 1,554,000 users may have been exposed 580,000 959,000 0 200,000 400,000 600,000 800,000 1,000,000 1,200,000 1,400,000 1,600,000 Number of impacted users Number of users potentially impacted by the getParkerHistory API vulnerability MyJTA app Passport Parking main app Other Passport whitelabeled apps 11/20
  • 12. Vulnerability Disclosure Process  The research team reported the vulnerability to a personal contact at the agency  The vulnerability was patched within 4 weeks Vulnerability discovered Early October Vulnerability report sent to transit agency October 30th Vulnerability patched by vendor Early December 12/20
  • 13. Improving the Vulnerability Disclosure Process  Problems encountered during the process: • No point of contact available for vendor or agency • No clear guidelines or process for disclosing the vulnerability • No notification was provided about the vulnerability’s resolution  A brief review of other Florida transit agencies and their vendors did not find any publicly-available responsible disclosure processes 13/20
  • 14. Implications for Transit Agencies  Discuss with your vendors how vulnerabilities are addressed • Does the vendor have a plan? • Will you be charged? • Do they inform users of breaches? • Do they inform agencies of breaches? • Do they conduct independent security audits?  The research team is discussing new policy guidelines with FDOT that may address: • Above issues in agency contracts with vendors • Agency disclosure to riders 14/20
  • 15. Discussion  Publicly available vulnerability disclosure policies may allow vulnerabilities to be quickly patched and improve communication between agencies, researchers, and vendors  Safety requirements may provide starting point for introducing cybersecurity requirements • Many processes, such as vulnerability disclosure and safety reporting, may be very similar  Potential requirements include: • Standards for data encryption • Publicly available vulnerability disclosure policies and contacts • Notification of affected parties, including customers, other agencies, and vendors • Audits and cybersecurity employee education 15/20
  • 16. Recommendations for Agencies  Follow best-practice recommendations for mitigating vulnerabilities • Review existing policies and procedures • Use secure authentication and encryption • Log access to sensitive infrastructure • Backup critical data in case of ransomware  Identify opportunities to improve employee training  Create vulnerability disclosure process (internal and external)  Track and report metrics (e.g., incidents)  Review and comply with state and federal requirements in case of data breach  Participate in information exchange with peers 16/20
  • 17. Recommendations for DOTs  Quantify and track metrics for cybersecurity incidents from agencies  Offer resources to improve training and funding opportunities • These are the top two agency-reported challenges for better cybersecurity  Consider incorporating cybersecurity into or alongside existing safety and security assessments 17/20
  • 18. Conclusions  Cybersecurity is a significant concern across all industries and should be a top priority of transit agencies and FDOT  Lack of training and funding were top cited challenges by agencies for improved cybersecurity  Risks and improvements should be reported and, when possible, measured to assist with resource allocation and to track efforts to improve cybersecurity  Many avenues for attack on existing transit systems require additional analysis • Existing vulnerabilities were identified for most technologies 18/20
  • 19. Acknowledgements  This paper is part of the project BDV25-977-51 “Enhancing Cybersecurity in Public Transportation”  Funded by the Florida Department of Transportation and supported by the National Center for Transit Research, a program of the Center for Urban Transportation Research at the University of South Florida  The opinions, findings and conclusions expressed in this publication are those of the author(s) and not necessarily those of the Florida Department of Transportation or the U.S. Department of Transportation  The authors would like to thank Gabrielle Matthews for serving as the FDOT project manager 19/20
  • 20. Thank You! Kevin Dennis kevindennis@mail.usf.edu 20 Sean J. Barbeau barbeau@usf.edu Jay Ligatti ligatti@usf.edu