MWR InfoSecurity Creates First Fully Automated EMV Fuzzing Solution
November 2015 by Marc Jacob
Cyber security consultancy MWR InfoSecurity today confirmed its research team has taken the first step towards creating a fully automated EMV fuzzing solution for POS and ATM transactions. As vulnerabilities can be introduced into the terminal-smartcard authentication procedure [during development], there is a need for structured and formal security evaluation to eliminate unexploited threats that exist in current devices used world-wide.
The Europay, MasterCard and Visa (EMV) standard – more commonly known as ‘Chip and Pin’, is used primarily by banks across the globe as the industry de-facto standard for authenticating smartcard transactions. MWR Labs PinPadPwn research in 2012 demonstrated that many EMV payment terminals can easily be compromised with malicious payment cards, casting serious doubts on the security integrity of modern EMV-enabled devices. At that time, the process of identifying these vulnerabilities was cumbersome, time-consuming and extremely difficult to repeat for developers, security testers and customers of card payment equipment.
Building on this previous research, MWR Labs’ latest EMV protocol fuzzer combines both hardware and software to evaluate the security integrity of a device under test (DUT):
• Hardware has been designed that includes a robotic arm, that automates insertion and retraction of the emulated smart card by means of a linear actuator, that interfaces with a computer via USB and provides abstraction to the EMV communication stream
• A Python interface has been developed to facilitate control of the EMV fuzzer, in effect allowing on-the-fly monitoring and emulation of an EMV stream with the DUT
• Various predefined security tests formalise the security evaluation procedure
The proposed design is ready to be interfaced with a fuzzing algorithm to create a fully automated EMV fuzzing solution.
As EMV is based on the ISO 7816 standard, which secures inter-operation between smartcards and associated terminals, this fuzzing research can also be applied to other implementations where smartcards are used - such as subscriber identity modules (SIMs) and DTV decoders.