Secure Mobile Payment via Trusted Computing

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Security Issues In Mobile IP
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Universität Innsbruck Leopold Franzens Copyright 2006 DERI Innsbruck LarCK Workshop, ISWC/ASWC Busan, Korea 16-Feb-14 Towards Scalable.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
Ecosystem Scenarios for Cloud-based NFC Payments
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
Luca Maria Aiello, Università degli Studi di Torino, Computer Science department 1 Tempering Kademlia with a robust identity based system.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A 1 September 2005MC-SSL Simulation 1 Analysis of Scalable Security – MC-SSL Simulation Reducing.
4/6/ :35 AM © 2004 Microsoft Corporation. All rights reserved.
Executional Architecture
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Off-the-Record Communication, or, Why Not To Use PGP
Vpn-info.com.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Analysis of Remote Attestation Lavina Jain, Jayesh Vyas.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
1 Bootstrapping Trust in a “Trusted” Platform Carnegie Mellon University November 11, 2008 Bryan Parno.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Enforcement of Security Policy Compliance in Virtual Private Networks Prof. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Chapter 10: Authentication Guide to Computer Network Security.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Electronic Payment Systems
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
Secure Electronic Transaction (SET)
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
A Design of Trusted Operating System Based on Linux BY LI HONGJUAN, LANYUQING The presenter Rusul J. ALSaedi Spring 2015 CS Dr. Rothstein.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Database Laboratory Regular Seminar TaeHoon Kim Article.
T Special Course in OS Security (Dan Forsberg) – Two possible steps from integrity-based remote attestation to the next level Property.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Presented by Edith Ngai MPhil Term 3 Presentation
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
KrypC Technologies Accelerated Blockchain Adoption.
Sami Alsouri Özgür Dagdelen Stefan Katzenbeisser
FICEER 2017 Docker as a Solution for Data Confidentiality Issues in Learning Management System.
Cloud Computing By P.Mahesh
Outline What does the OS protect? Authentication for operating systems
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Presentation transcript:

Secure Mobile Payment via Trusted Computing Qi Li, Tsinghua University Xinwen Zhang and Jean-Pierre Seifert, Samsung Research 张新文 Hulin Zhong, Lutong Network This talk does not represent Samsung’s technical view

Mobile Threats Mobile devices become more open and general-purpose McAfee's 2008 Mobile Security Report nearly 14% percent of global mobile users have been directly infected or have known someone who was infected by a mobile virus more than 86% of consumers worry about receiving inappropriate or unsolicited content, fraudulent bill increases, or information loss or theft more then 70% of users expect mobile operators or device manufacturers to pre-load mobile security functionality. F-secure 2007 mobile threat report 370 malware by end of 2007 viruses, Trojans, and spyware User downloaded codes, BT, MMS, MMC card

Related Work in Samsung Secure boot on mobile phone devices Secure u-boot Integrity verification of kernel image and read-only filesystem Integrity measurement for mobile phone IMA SELinux TCG MPWG compatible mobile phone platform

Outline Problem Statement Background Overview of Secure Payment Scheme Secure Payment Transactions Enhanced Payment Schemes Prototype Implementation and Evaluation Conclusion

Mobile Payment A typical mobile payment scheme involves three parties: a mobile device, a merchant, and a financial service provider. There are two types of e-payment applications: Check-like payments require a certain amount of virtual money which is taken away from the customer before a payment is made. Cash-like payments require that a customer’s account is involved in each payment transaction. To secure a payment transaction, a trusted third party (TTP) is involved to authenticate and authorize users. General security requirements of mobile payments have been well studied in the literature, however, mobile phones face the intrusion of different malware. Phone becomes more general-purpose, and open More apps deployed, mobile payment is emerging, in 3G network,

Problem Statement The existing embedded operating systems (OS) cannot provide sufficient integrity and isolation protection for the security demands of mobile payment applications. While the majority of existing research focuses on secure payment transactions, there is no intensive research on platform integrity protection for secure payments on mobile devices. Without trusted mobile devices, the security of payment applications and data cannot be guaranteed at all. Existing secure payment schemes fail to provide a platform integrity protection solution for mobile payment transactions. The problem how to establish and verify a secure runtime environment of an e-wallet software was never addressed until now. The major problem is to make sure the right app makes payment, instead of malware

Trusted Computing As a key mechanism defined by the TCG, attestation is used to report the measured PCR values to a requestor who needs to know the runtime-state of a platform. System components validate whether the runtime environment; Measurement agent measures the state of the runtime environment; Attestation service provides the platform integrity metrics. Typically, a trusted boot mechanism is also required for a trusted platform, e.g., with the help of a core root of trust for measurement (CRTM) and the TPM itself.

Secure Payment Scheme We propose a platform integrity protection solution for the whole secure mobile payment process. Our architecture consists of five major parties for a complete secure m-payment solution: Mobile phone: A trusted mobile device consists of a TPM and trusted services which provide the integrity evidences of the platform. Software provider: A software provider provides payment applications in a secure way, such as e-wallet. Merchant: Merchants not only need to provide the commodities that customers demand, but also the Point of Sales (POS) devices to authorize customers and guarantee that the payment information is forwarded to the financial service providers. Financial service provider: provides user accounts for m-payments and validates the user payment information during the payment transaction processes. TC service provider: a trusted third party (TTP) to validate whether a measurement list is non-tampered and the system integrity

Secure Payment Transactions Secure software downloading For a secure payment scheme, e-wallet applications are essential for m-payment transactions. In this context an e-wallet runtime environment is also important. Secure e-wallet initialization In order to secure payment transaction processes itself, we also need to secure the e-wallet initialization process. Secure payment transaction Similarly, we need to evaluate and validate the integrity of the whole mobile phone before an actual payment process. We assume that the key pairs of an AIK should be generated inside the TPM of the mobile phone and the AIK credential should be signed and retrieved from the third trusted party.

Secure Software Downloading The process of application downloading consists of two stages, the first stage is integrity measurement and the second is software downloading. A measurement request is generated by the application manager, and the measurement service initiates the respective measurement operation. Software runtime environment and e-wallet application downloading, which have similar procedures.

Secure Downloading Protocol The TC service provider verifies the AIK certificate which binds the verification key of the Quote. The signatures of the software runtime and the software integrity are verified before software installation. TPM Attestation Service Measurement Agent Application Manager Software Provider TC Service Provider 2) Quote= Sig{PCR, nonce}AIK 1) Attestation request: {nonce} 3) Measurement List (ML) 4) {Quote, (ML} 5) {Quote, (ML} 6) {Quote, (ML} 6a) determine trusted credential 6b) validate signature 6c) validate ML using PCR 8) {software| SIg{software}SK_SP} 7) Attestation result 8a) verify the software provider 8b) verify the software

E-wallet Initialization The e-wallet initialization aims to generate a key pair and securely stores the private part (e.g., account info) for the m-payment application. Seal secrets with TPM

Secure payment transaction Procedures Similar to the above two processes, the integrity measurement mechanism is also invoked in the process of secure payment transaction. Secure Payment Protocol

Enhanced Payment Schemes The efficiency and scalability issues of mobile payment will greatly influence mobile payment performance. First, in the above scheme, each mobile payment application needs an AIK, which introduces management cost to the overall mobile computing infrastructure Second, in the above scheme the TC service provider is involved in the attestations of every payment transaction. We propose two enhanced mobile payment solutions for different optimization requirements. In the first solution, we leverage the phone number as the device identity to resolve the credential management problem. Second, for further optimization, we also reduce the TC service provider related attestation steps during payment transactions. These two enhanced schemes are independent of each other, and they can be jointly used in a real system.

IBS for Attestation In a typical IBS system, there are four basic algorithms: setup algorithm, extract algorithm, sign algorithm and verify algorithm. In this scheme, we fully utilize the mobile phone infrastructure and replace in the transaction processes the AIK based public key signature with an IBS algorithm. We only replace the signature algorithm and do not change the underlying payment protocols, the enhanced schemes achieves the same security goals. PKG 1k (MK,MSK) MKg MSK,“Alice” sQIDA UKg sQIDA MK Alice sQIDA MK, “Alice” Bob M,σ M Sign Verify acc/rej

Extended AIK Certificate for Attestation In the payment scheme, the financial service provider needs to interact with the TC service provider within every payment transaction, which might be a potential performance bottleneck. The core idea behind this scheme is that the integrity of the mobile phone is validated when the TC service provider issues an AIK certificate and the expected integrity values are included within the certificate. In summary, compared to the original one, several benefits are achieved by this new scheme: Flexibility: In this scheme, a financial service provider or a POS terminal can directly attest a mobile phone on behalf of a TC service provider Security: The integrity of the mobile platform is in any case validated by comparing the claimed measurement values to those embedded inside the AIK certificate. Performance: A TC service provider is not involved in every payment transaction and a financial service provider can directly attest a mobile phone TPM Attestation Service Measurement Agent M-Payment Application Financial Provider 2) Quote= Sig{PCR, nonce}AIK 1) Attestation request: {nonce} The cost is deployment cost: update/upgrade e-wallet needs new AIK from TC service provider 3) Measurement List (ML) 4) {Quote, (ML} 5) TPM_Unseal(PCR) 6) { User account| Signature |Quote, (ML} 6a) determine trusted credential 6b) validate signature 6c) validate PCR in credential Transaction e-receipt}

Prototype Overview In our prototype, the platform integrity storage is realized by a software TPM. Specifically, Trusted Java is used to provide the TCG Software Stack (TSS). Different platforms were developed to act as a mobile device, a financial service provider, a POS terminal, and a TC service provider, respectively.

Performance Evaluation We only evaluated the performance of payment transactions including the integrity attestation operations. The measured time includes the time of the TPM operations, the measurement time, the verification time and the overhead. A whole payment transaction without SSL may cost only 2.70s — even with 100 concurrent transactions to the same financial service server. We similarly evaluated our enhanced payment scheme using an IBS. Similar performance is achieved.

Related Work M-payment security has been studied extensively in the literature. security requirements of mobile payments biometric-enabled payment system solutions considering the restrictions of mobile networks …… Another line of work focuses on securing e-wallets. A generalization of e-wallets to enable account-based payments. Ebringer et al. propose a parasitic authentication, thus offering security for handheld computers Molar et al. provide a secure RFID solution with remote attestation. They fully use TC technologies to secure RFID. Platform integrity measurement and attestation mechanisms IBM IMA Property-based, Semantic-aware, Behavior-based attestation

Conclusion We proposed a secure mobile payment scheme using trusted computing (TC) technology. In our proposed architecture we presented a platform integrity protection solution for mobile payment via NFC. Our scheme addresses the unresolved security challenges of mobile payment, including platform integrity verification and user privacy protection. In order to improve the efficiency, flexibility and performance of our payment scheme, we proposed two enhanced payment schemes, utilizing an IBS scheme and an attestation cache. The experimental results show that our scheme is efficient and effective to achieve the security target.

Problems and Ongoing Work Platform integrity measurement Existing solution are not practical Either trust all components, or trust some untrusted components Representing of platform integrity measurement Static/loadtime measurement only Our ongoing work: Efficient IM and attestation for mobile phone devices Leverage some unique properties of phone systems and business model Leverage integrity models: Biba, Clark-Wilson, LOMAC, SEIM, etc To reduce measured components But still preserve the attestation assurance Via mandatory access control in OS level for information flow monitoring Virtualization on mobile devices Virtualogix, Trango, OpenKernel, etc.

Q&A xinwen.z@samsung.com Thanks Q&A xinwen.z@samsung.com