中大研究發現 生產商:已堵漏洞 手機支付存被盜風險 兩常用方式憂中招

愈來愈多港人愛以手機支付程式購物,中文大學工程學院最新研究發現流動支付系統的保安漏洞,兩款較常見手機支付方式,包括支付寶的二維碼(QR Code)、專屬Samsung Pay磁條讀卡器驗證(MST),不法分子可在用戶支付的短時間內,透過惡意程式竊取支付代碼(token),取得用戶的交易權,在用戶不知情下盜走款項。
Date: 
Friday, September 29, 2017
Media: 
Sing Tao Daily

中大發現QR Code支付系統有漏洞 或會被盜用款項

中文大學研究發現有流動支付系統,包括「二維碼」,即「QR Code」有保安漏洞。不法分子可以透過程式,中斷用戶原本的交易,盜用款項。 網上交易、一些街上店舖,以至報紙檔都接受「QR Code」付款。流動支付系統越來越普遍,但可能隨時成為歹徒的目標。
Date: 
Thursday, September 28, 2017
Media: 
TVB News

支付寶Samsung Pay有保安漏洞

近年來手機支付讓購物更加便利,但是新興的支付模式也帶來更多安全隱患。中文大學信息工程學系教授張克環的研究團隊發現,支付寶及Samsung Pay均存有保安漏洞,用家或在不為意的情況下「被交易」,招致損失。研究團隊已通知相關支付平台採取措施
Date: 
Friday, September 29, 2017
Media: 
Epoch Times

研究指不法分子能接收Samsung Pay交易訊號

中大研究發現流動支付系統的保安漏洞,涉及「支付寶」等利用二維碼(QR code)付款的程式,及三星專屬「Samsung Pay」流動支付系統的磁條讀卡器驗證功能(MST)。 中大信息工程學系教授張克環表示,QR code用手機鏡頭進行掃描,不法分子可利用惡意程式控制手機前置鏡頭,偷拍用家在付款時顯示的QR code倒影,再進行未經授權的交易。
Date: 
Thursday, September 28, 2017
Media: 
RTHK

中大揭手機支付漏洞 超市付款QR碼1分鐘即偷

手機「埋單」成為大趨勢,但原來暗藏保安漏洞,隨時「俾錢」變「送錢俾賊仔」。有研究發現三款較常見手機支付方式,包括近場通訊(NFC)、二維碼(QR Code)、磁條讀卡器驗證(MST),不法分子可在用戶支付短時間內,透過惡意裝置竊取支付令碼(payment code),將之用於另一項交易,用戶無法收到交易失敗的信號,不知不覺蒙受損失。
Date: 
Thursday, September 28, 2017
Media: 
bastillepost

Prof. Liao Wei Hsin’s Team Awarded Best Paper from ASME

Date: 
2017-09-28
Thumbnail: 
Body: 

A research team led by Prof. Liao Wei Hsin, Department of Mechanical and Automation Engineering, was awarded the Best Paper Award in Mechanics and Material Systems from American Society of Mechanical Engineers (ASME) for the journal paper entitled "Self-expanding/shrinking structures by 4D printing", co-authored by M Bodaghi, A R Damanpack, and W H Liao.

Utilizing additive manufacturing into smart materials has led to 4D printing technology for creating dynamic devices that can change their shape and/or function on-demand and over time. Adaptive structures capable of self-expanding and self-shrinking were created by 4D printing. Actuator units were designed and fabricated directly by printing fibers of shape memory polymers in flexible beams with different arrangements. They can serve as tubular stents and grippers for biomedical or piping applications.

Prof Liao’s research focuses on smart materials and structures, energy harvesting, vibration control, mechatronics, and robotic exoskeleton. It has led to publications of 200 technical papers in international journals and conference proceedings, 16 patents in US, China, Hong Kong, Taiwan, Japan, and Korea. He is a Fellow of the American Society of Mechanical Engineers, Institute of Physics, and The Hong Kong Institution of Engineers.

The award was presented at the ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. 

 

Filter: Dept: 
Faculty
MAE

中大研究:QR Code及三星MST流動付款系統存保安漏洞

中大信息工程學系「系統保安研究實驗室」研究發現,流動支付系統出現保安漏洞,主要涉及二維碼(QR Code)及磁帶讀卡器驗證(MST)功能,而本港常用的近場通訊(NFC)技術,則不在研究範圍內。
Date: 
Thursday, September 28, 2017
Media: 
Ming Pao Daily News

香港中文大学发现流动支付系统新保安漏洞

香港中文大学工程学院周四(9月28日)表示,最新发现主流流动支付系统的保安漏洞。针对目前流动支付两种较常用的身份验证方法,二维码(QR Code)及扫磁条读卡器,研究团队发现,不法分子可以用恶意软件控制手机前置镜头,在用户进行交易时盗取付款人的二维码(QR Code),以进行未被授权的交易
Date: 
Thursday, September 28, 2017
Media: 
FX168

Major Security Loophole in Mobile Payment Systems Discovered by Department of Information Engineering

Date: 
2017-09-28
Thumbnail: 
Body: 

The System Security Lab, led by Prof. Kehuan ZHANG from the Department of Information Engineering has analyzed various major mobile payment systems for their security vulnerabilities, and discovered a major loophole. The finding has caused a large third party payment platform in mainland China to promptly implement new security measures to prevent fraud. The result of the study has also been released at USENIX Security ’17, a prestigious annual academic conference on internet security, held last month in Vancouver. 

The rapid advancement of financial technology has brought forth the idea of a ‘cashless society’.  While a multitude of mobile payment systems are being deployed around the world, concerns over security issues are also on the rise. In mobile payment transactions, the key to communications between the mobile payer and payee is a payment token that is issued by the payment service provider to verify the payment. Currently, the four most widely adopted forms of transmitting these tokens are: Near-Field Communication (NFC), Quick Response Code (QR code) scans, Magnetic Secure Transmission (MST), and audio signals. According to Prof. ZHANG, whose team has spent two years conducting an in-depth study into these payment systems, apart from NFC, the remaining three formats support one-way communications only. In other words, if the transaction fails, the payee’s device is unable to notify the payer and cancel or reclaim the token already issued – a loophole an active adversary can exploit. 

Of the three vulnerable formats of token verification, QR Code scanning is the most popular. The study has revealed that a malicious device is able to sniff the token from the payee’s screen from afar and spend it on a different transaction. Because of the one-way nature of this form of communication, the payer is unaware of the transaction failure and, subsequently, suffers financial loss. Upon the discovery, the research team notified the relevant third party payment platform, which has taken prompt action to shut down their QR Code online transaction function, while keeping the QR Code offline payment function active. With offline payment functions, payers do not have to flash their tokens as frequently, reducing the possibility of fraud. This major discovery has thereby protected a large number of mobile payment system users and helped guard their e-wallets.

Regarding the MST function uniquely used by Samsung Pay, payers are required to place their handsets within a 7.5cm distance of the payees’ POS (Point of sale) for identification. But after a series of tests, the team discovered that the magnetic signals can be picked up from 2 meters away. A rogue in a supermarket queue can seize the opportunity to attack and steal the token. Audio signal tokens most commonly deployed in automated vending machines also suffer from a similar loophole. As the payers’ handsets send the tokens to the vending machines via audio signals, an adversary can easily sniff the token and inflict losses on the payers. 

Though the team has already notified the relevant third party payment platforms, Prof. ZHANG is keen to remind mobile payment users to stay alert and avoid downloading mobile apps from unknown sources. Once a malicious application is downloaded, it can gain control of the front camera, capture the reflections of QR Codes from scanners during transactions, send them to colluders, and silently incur losses on the payers’ part. 

Prof. ZHANG and his team have presented the findings in a paper titled Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment at the USENIX Security ’17, a prestigious academic conference on internet security. An annual gathering of topnotch experts, academics, researchers, law enforcers and policy makers from around the world, the conference is where the latest research on internet security is released, and is widely respected by academia and the industry. 

In the past three years, the System Security Lab at CUHK has released six highly regarded papers at various top internet security conferences. It is leading Hong Kong and the world in system security research.

Demos: https://sites.google.com/site/stlsinmobilepayment/home

 

 

 

Filter: Dept: 
Faculty
IE
Media Release

港中大揭移動支付漏洞 用戶易被盜取

流動支付方式近年愈趨流行,部分支付方式暗藏保安漏洞,成為香港移動支付進一步拓展的障礙。香港中文大學工程學院研究發現內地流行常用的二維碼掃描(QR code)、磁條讀卡器驗證存在明顯的安保漏洞,容易被不法分子盜取交易授權,招致損失。
Date: 
Thursday, September 28, 2017
Media: 
Wen Wei Po

Pages