中大揭手機支付漏洞 超市付款QR碼1分鐘即偷

手機「埋單」成為大趨勢,但原來暗藏保安漏洞,隨時「俾錢」變「送錢俾賊仔」。有研究發現三款較常見手機支付方式,包括近場通訊(NFC)、二維碼(QR Code)、磁條讀卡器驗證(MST),不法分子可在用戶支付短時間內,透過惡意裝置竊取支付令碼(payment code),將之用於另一項交易,用戶無法收到交易失敗的信號,不知不覺蒙受損失。
Date: 
Thursday, September 28, 2017
Media: 
bastillepost

Prof. Liao Wei Hsin’s Team Awarded Best Paper from ASME

Date: 
2017-09-28
Thumbnail: 
Body: 

A research team led by Prof. Liao Wei Hsin, Department of Mechanical and Automation Engineering, was awarded the Best Paper Award in Mechanics and Material Systems from American Society of Mechanical Engineers (ASME) for the journal paper entitled "Self-expanding/shrinking structures by 4D printing", co-authored by M Bodaghi, A R Damanpack, and W H Liao.

Utilizing additive manufacturing into smart materials has led to 4D printing technology for creating dynamic devices that can change their shape and/or function on-demand and over time. Adaptive structures capable of self-expanding and self-shrinking were created by 4D printing. Actuator units were designed and fabricated directly by printing fibers of shape memory polymers in flexible beams with different arrangements. They can serve as tubular stents and grippers for biomedical or piping applications.

Prof Liao’s research focuses on smart materials and structures, energy harvesting, vibration control, mechatronics, and robotic exoskeleton. It has led to publications of 200 technical papers in international journals and conference proceedings, 16 patents in US, China, Hong Kong, Taiwan, Japan, and Korea. He is a Fellow of the American Society of Mechanical Engineers, Institute of Physics, and The Hong Kong Institution of Engineers.

The award was presented at the ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. 

 

Filter: Dept: 
Faculty
MAE

中大研究:QR Code及三星MST流動付款系統存保安漏洞

中大信息工程學系「系統保安研究實驗室」研究發現,流動支付系統出現保安漏洞,主要涉及二維碼(QR Code)及磁帶讀卡器驗證(MST)功能,而本港常用的近場通訊(NFC)技術,則不在研究範圍內。
Date: 
Thursday, September 28, 2017
Media: 
Ming Pao Daily News

香港中文大学发现流动支付系统新保安漏洞

香港中文大学工程学院周四(9月28日)表示,最新发现主流流动支付系统的保安漏洞。针对目前流动支付两种较常用的身份验证方法,二维码(QR Code)及扫磁条读卡器,研究团队发现,不法分子可以用恶意软件控制手机前置镜头,在用户进行交易时盗取付款人的二维码(QR Code),以进行未被授权的交易
Date: 
Thursday, September 28, 2017
Media: 
FX168

Major Security Loophole in Mobile Payment Systems Discovered by Department of Information Engineering

Date: 
2017-09-28
Thumbnail: 
Body: 

The System Security Lab, led by Prof. Kehuan ZHANG from the Department of Information Engineering has analyzed various major mobile payment systems for their security vulnerabilities, and discovered a major loophole. The finding has caused a large third party payment platform in mainland China to promptly implement new security measures to prevent fraud. The result of the study has also been released at USENIX Security ’17, a prestigious annual academic conference on internet security, held last month in Vancouver. 

The rapid advancement of financial technology has brought forth the idea of a ‘cashless society’.  While a multitude of mobile payment systems are being deployed around the world, concerns over security issues are also on the rise. In mobile payment transactions, the key to communications between the mobile payer and payee is a payment token that is issued by the payment service provider to verify the payment. Currently, the four most widely adopted forms of transmitting these tokens are: Near-Field Communication (NFC), Quick Response Code (QR code) scans, Magnetic Secure Transmission (MST), and audio signals. According to Prof. ZHANG, whose team has spent two years conducting an in-depth study into these payment systems, apart from NFC, the remaining three formats support one-way communications only. In other words, if the transaction fails, the payee’s device is unable to notify the payer and cancel or reclaim the token already issued – a loophole an active adversary can exploit. 

Of the three vulnerable formats of token verification, QR Code scanning is the most popular. The study has revealed that a malicious device is able to sniff the token from the payee’s screen from afar and spend it on a different transaction. Because of the one-way nature of this form of communication, the payer is unaware of the transaction failure and, subsequently, suffers financial loss. Upon the discovery, the research team notified the relevant third party payment platform, which has taken prompt action to shut down their QR Code online transaction function, while keeping the QR Code offline payment function active. With offline payment functions, payers do not have to flash their tokens as frequently, reducing the possibility of fraud. This major discovery has thereby protected a large number of mobile payment system users and helped guard their e-wallets.

Regarding the MST function uniquely used by Samsung Pay, payers are required to place their handsets within a 7.5cm distance of the payees’ POS (Point of sale) for identification. But after a series of tests, the team discovered that the magnetic signals can be picked up from 2 meters away. A rogue in a supermarket queue can seize the opportunity to attack and steal the token. Audio signal tokens most commonly deployed in automated vending machines also suffer from a similar loophole. As the payers’ handsets send the tokens to the vending machines via audio signals, an adversary can easily sniff the token and inflict losses on the payers. 

Though the team has already notified the relevant third party payment platforms, Prof. ZHANG is keen to remind mobile payment users to stay alert and avoid downloading mobile apps from unknown sources. Once a malicious application is downloaded, it can gain control of the front camera, capture the reflections of QR Codes from scanners during transactions, send them to colluders, and silently incur losses on the payers’ part. 

Prof. ZHANG and his team have presented the findings in a paper titled Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment at the USENIX Security ’17, a prestigious academic conference on internet security. An annual gathering of topnotch experts, academics, researchers, law enforcers and policy makers from around the world, the conference is where the latest research on internet security is released, and is widely respected by academia and the industry. 

In the past three years, the System Security Lab at CUHK has released six highly regarded papers at various top internet security conferences. It is leading Hong Kong and the world in system security research.

Demos: https://sites.google.com/site/stlsinmobilepayment/home

 

 

 

Filter: Dept: 
Faculty
IE
Media Release

港中大揭移動支付漏洞 用戶易被盜取

流動支付方式近年愈趨流行,部分支付方式暗藏保安漏洞,成為香港移動支付進一步拓展的障礙。香港中文大學工程學院研究發現內地流行常用的二維碼掃描(QR code)、磁條讀卡器驗證存在明顯的安保漏洞,容易被不法分子盜取交易授權,招致損失。
Date: 
Thursday, September 28, 2017
Media: 
Wen Wei Po

中大揭手機畀錢藏被盜漏洞 支付寶三星中招

流動支付方式近年愈趨流行,但部分支付方式暗藏保安漏洞。中文大學工程學院研究發現內地流行常用的二維碼掃描(QR code)、磁條讀卡器驗證和聲波轉化都出現交易上的問題,容易被不法分子盜取交易授權,從而招致損失。
Date: 
Thursday, September 28, 2017
Media: 
on.cc

中大揭手機支付漏洞 超市QR碼付款1分鐘偷錢

不少港人愛以手機「埋單」,但原來暗藏保安漏洞,隨時「俾錢」變「送錢俾賊仔」。有研究發現三款較常見手機支付方式,包括近場通訊(NFC)、二維碼(QR Code)、磁條讀卡器驗證(MST),不法分子可在用戶支付短時間內,透過惡意裝置竊取支付令牌(payment code),將之用於另一項交易,用戶無法收到交易失敗的信號,不知不覺蒙受損失。
Date: 
Thursday, September 28, 2017
Media: 
Sing Tao Daily

流動支付系統揭有保安漏洞 支付寶Samsung Pay易被盜款

市民使用流動電子支付日趨盛行,但中大研究發現包括內地極為流行的「支付寶」以至三星使用的「Samsung Pay」等流動支付系統都存在潛在安全問題。尤其是支付寶使用二維條碼(QR Code)要靠用手機鏡頭進行掃描,不法份子能用黑客程式入侵手機的前置鏡頭,偷取拍攝掃瞄器所顯示的QR Code倒影,不法份子就能利用該QR Code進行未經授權的交易。
Date: 
Thursday, September 28, 2017
Media: 
Apple Daily

中大發現多種流動支付系統存保安漏動

流動支付系統雖然方便日常生活,但安全風險卻不容忽視。中文大學工程學院研究團隊發現,4種本港常用的流動支付途徑中,除了近場通訊(NFC)外,其他的支付途徑如二維碼(QR Code)掃描、磁條讀卡器驗證(MST)和聲波轉化都存在保安漏動。
Date: 
Thursday, September 28, 2017
Media: 
Hong Kong Economic Journal

Pages