SoK: Attacks on Modern Card Payments

📅 2025-04-04
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work systematically analyzes security vulnerabilities in the EMV contactless payment protocol. Addressing the lack of a unified attack taxonomy and causal modeling in prior research, we propose the first comprehensive analytical framework encompassing security objectives, adversary models, and compositional attack pathways. Leveraging formal modeling, protocol reverse-engineering, attack tree analysis, and cross-version comparison, we identify and empirically validate 17 classes of composable vulnerabilities—exposing deep interdependencies between design trade-offs and standardization flaws. Our findings directly informed EMVCo’s revision of its Security Assessment Guidelines draft. The study delivers actionable, system-level recommendations for protocol evolution, validated across mainstream implementations including chip-based cards and mobile payment platforms.

Technology Category

Application Category

📝 Abstract
EMV is the global standard for smart card payments and its NFC-based version, EMV contactless, is widely used, also for mobile payments. In this systematization of knowledge, we examine attacks on the EMV contactless protocol. We provide a comprehensive framework encompassing its desired security properties and adversary models. We also identify and categorize a comprehensive collection of protocol flaws and show how different subsets thereof can be combined into attacks. In addition to this systematization, we examine the underlying reasons for the many attacks against EMV and point to a better way forward.
Problem

Research questions and friction points this paper is trying to address.

Analyzing attacks on EMV contactless payment protocol
Identifying and categorizing security flaws in EMV
Proposing solutions to mitigate EMV protocol vulnerabilities
Innovation

Methods, ideas, or system contributions that make the work stand out.

Systematize EMV contactless protocol attacks
Categorize comprehensive protocol flaws
Propose better security solutions
🔎 Similar Papers
No similar papers found.
X
Xenia Hofmeier
Department of Computer Science, ETH Zurich, Switzerland
D
David A. Basin
Department of Computer Science, ETH Zurich, Switzerland
Ralf Sasse
Ralf Sasse
Senior Scientist in Computer Science, ETH Zurich
Formal MethodsSecurity
J
Jorge Toro-Pozo
SIX Digital Exchange, Switzerland