27C3: Chip and PIN is Broken (en)

Speaker: Steven J. Murdoch

Vulnerabilities in the EMV

Protocol EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Europe; it is being introduced in Canada; and there is pressure from banks to introduce it in the USA too. EMV secures credit and debit card transactions by authenticating both the card and the customer presenting it through a combination of cryptographic authentication codes, digital signatures, and the entry of a PIN.

In this paper we describe and demonstrate a protocol flaw which allows criminals to use a genuine card to make a payment without knowing the card’s PIN, and to remain undetected even when the merchant has an online connection to the banking network.

OHM2013: SIM card exploitation

Speaker: Karsten Nohl

SIM cards are among the most widely-deployed computing platforms with over 7 billion cards in active use, but little is known about their security beyond manufacturer claims. Besides SIM cards main purpose of identifying subscribers, most of them provide programmable Java runtimes.

Based on this flexibility, SIM cards are poised to become an easily extensible trust anchor for otherwise untrusted smartphones, embedded devices, and cars. The protection pretense of SIM cards is based on the understanding that they have never been exploited. This talk ends this myth of unbreakable SIM cards and illustrates that the cards — like any other computing system — are plagued by implementation and configuration bugs.

ShmooCon 2014: ISP's Unauthenticated SOAP Service

Speaker: Nicholas Popovich

This presentation is meant to encourage individuals to put the applications and software that they may use on their own home or small business networks under the research microscope. This will be a discussion of a recent independent research project that eventually led to an information disclosure vulnerability by a major U.S. ISP.

This is also an example of when a coordinated disclosure goes right. What began with simple curiosity into the inner workings of an application lead to the ability to list wireless network names and wireless encryption keys (among other things) armed only with a WAN IP address.

DeepSec 2013: Cracking And Analyzing Apple iCloud Protocols

Speaker: Vladimir Katalov

Vladimir Katalov (ElcomSoft Co. Ltd.) presents the results of analysing the Apple iCloud protocol and its impact on iCloud services. His presentation was held at DeepSec 2013. Apple iCloud was meant to improve flexibility and comfort when using your iDevices, however it also provides opportunities to extract as much as everything about the user.

29C3: Privacy and the car of the future (EN)

Speaker: Christie Dudley

Considerations for the Connected Vehicle To date, remote vehicle communications have provided little in the way of privacy. Much information and misinformation has been spread on what the system is and can do, especially within the information security community.

In this talk I will examine a current system high level design for North American vehicles, conforming to IEEE and SAE standards and used in a recent road test in Ann Arbor, Michigan, USA. I will consider privacy concerns for each portion of the system, identifying how they may be addressed by current approaches or otherwise considered solutions. I conclude with a discussion of the strategic value in engagement between the privacy community and automotive industry during development efforts and the potential community role in raising privacy as a competitive advantage.