You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/321797449

Mobile Wallet Payments Recent Potential Threats and Vulnerabilities with its
possible security Measures

Conference Paper · December 2017

CITATIONS READS

3 7,743

1 author:

Mansi Bosamia
CMPICA
8 PUBLICATIONS   7 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Mobile Wallet Payments Recent Potential Threats View project

All content following this page was uploaded by Mansi Bosamia on 25 April 2018.

The user has requested enhancement of the downloaded file.


Mobile Wallet Payments Recent Potential Threats and
Vulnerabilities with its possible security Measures
Mansi Prakashbhai Bosamia
CMPICA
CHARUSAT
Changa, Anand, India
mansibosamia@gmail.com

Abstract— The volume of mobile wallet payment transactions has Mobile wallets have the key characteristics of physical cash
considerably increased in the last decade. There are many mobile such as anonymity, transferability, and security. Also they
wallets already has been developed and also new mobile wallets have few differences defines in table 1. The implementation
coming in the market day by day for payment transactions. and real-life deployment of mobile wallets schemes are
These mobile wallet application uses highly distributed inherently distributed with its processing issues including
environments. So far it has the focus on addressing only security scalability, performance and availability. Till today, research
issues. However, key important criteria of distributed processing on mobile payment has been directed mostly towards
such as performance, scalability, and availability. In this paper, I addressing security requirements through the design of
identify and analyze the different threats and vulnerabilities of a
suitable security protocols and mechanisms. [6] For that I need
mobile wallet application to obtain a high-level understanding of
the various types of threats that may affect mobile wallet
to identify security threats. This paper defines mobile payment
applications with its possible security measures. system, mobile wallet, mobile wallet threat model, and threats
and vulnerability with mobile wallets security measures.
Keywords— e-cash, mobile payment system, mobile wallet
II. MOBILE PAYMENT SYSTEM
I. INTRODUCTION Mobile payments have been popular and the most accepted
About an earlier era, growing of e-commerce concerns has as an emerging payment method in both advanced and
been expressed in the academic and financial communities emerging economies. Mobile wallets are continues growing
about the future and safety. Now, the current era and recent and affects many factors such as increased deployments,
future is of electronic cash, most common practice of e-cash mobile penetration, financial inclusion, more convenient,
payments is credit cards and debit cards. The recent trends of faster, and more economical.
e-cash is apple pay, google pay, paytm, freecharge, mobikwik,
sbi money, icici money, airtel money, jio money, payUmoney, A. Mobile Payment Definition
hdfc zap pay, many more banking mobile apps, etc. Mobile payment is payment services operated under
financial guideline and performed financial transactions from
TABLE I. COMPARISION ON DIFFERENT MOBILE WALLETS or via a mobile device.
B. Mobile Wallet Definition accepted the mobile payments solutions. Still there are many
It is a virtual wallet in your smartphone, in which money is threats affecting to secure transactions to identify and
stored in the form of virtual money. So overall, it is a digital understand the mobile wallets threat model in this paper.
wallet out of which you can make money transactions and
payments. It has the combination of software and hardware on III. MOBILE WALLETS THREAT MODEL
certain devices and all seek to replace the use of traditional A threat model of a mobile wallet applications such as
credit/debit cards with mobile phones. You can pay money paytm, apple pay, google wallet, freecharge, mobikwik, sbi
using smart phone apps, text messages, social media or money, icici money, airtel money, jio money, payUmoney,
websites. hdfc zap pay etc. shall consider threats against basic
components of the mobile wallet. Mobile wallets “trust
boundaries” depicted below as dotted yellow lines. This area
of mobile wallet has most possibilities for threats to occur. A
generic threat model of the mobile wallet system is shown
below: [7]

A. Mobile Wallet Application Users Threats


 Phishing attacks: Mobiles have personal and corporate
information of customer which may to carry out
Fig. 1. Mobile Payment System
sophisticated attacks. These attacks user by phishing
emails. It is an attempt to trap a user to disclose the
In the mobile payment system, agents are playing main
information.
role. These agents are application providers, mobile network
operators, mobile device manufacturers, terminal providers,  Social engineering: In social engineering, user data
and third-party agents. The client connects with mobile available in the public domain and the attackers can
network using application provider. Application provider steal it from there. This information monetized or sold
contains credit/debit cards details, mobile balance, bank in underground market forums or used for fraudulent
account details for payment transaction. Mobile network payments. Sometimes attackers use this theft
operators provides services for make purchases, transfer information as their identity.
money, pay bills, etc. Other common services include third
party payments, online services access, etc. Some mobile  Unintentional installation of rogue and malware
device manufacturers traditionally produce mobile phones applications: Attackers will install malware by
with payment functions. Third party agents acting as retail malicious attachment, Redirecting the user to a
outlets to deal directly with a customer for reducing services malicious URL, insecure WiFi hotspots, a network
cost. Third party agents have sub-agents by the permission of spoofing attack, fake access point with same network,
law. Cash merchant agents provides cash-in and cash-out fake website, etc. Then use user information for mobile
facility but not allows other banking transactions such as wallet payment.
account open/close, loan, check, etc.  Mobile Operating System Access Permissions: Users
Currently, mobile wallets use has been increased due to give certain permission to OS access, that can be use
more protected security aspects are enhanced. In past people by attackers to access sensitive data and harm the
don’t have the acceptance of mobile base financial mobile application.

transactions but as the time changes, people have been Fig. 2. Mobile Payments and Digital Wallets Threat Model
The Possible Vulnerabilities of users are:  User to device biometrics authentication factors
 Lack of user’s due carefulness of validating content safely.
in emails, messages, SMS being truthful before  Keep OS up to date.
selecting URLs, downloading attachments.  Keep default security controls & measures on device.
 Use public Wi-Fi connections for mobile payments.  Secured Biometric validation data.
 Use of fake access point with same network.
 Use of fake websites.
C. Mobile Wallet Applications Threats
 Missing minimum security hygiene rules.
 To install non-trusted applications and files on  Reverse engineering: Reverse engineering offers to
device. attack on hardcoded passwords and encryption keys
Possible Security Measures of Users like data. For that attackers have high level of
understanding of mobile wallet payment applications.
 Security awareness, education and communication.
 Do not use public Wi-Fi hotspots for mobile wallet  Tampering with the mobile payment application and
payments. the use of rootkits: An attacker may choose to
 Distinguish real and fake website and access point, backdoor a mobile payment application to capture
only use real one. login details and send these to an attacker controlled
 Keep OS up to date and don’t use untrusted phone. server. By this attacker can downloading and uploading
any data from user application. This is a very realistic
threat on mobile devices. [7]
B. Mobile Devices Threats
 Installation of rootkits/malware: Discussed in mobile
 Unauthorized access of lost or stolen mobile device: device threats.
Once mobile has stolen then attacker can steal any
sensitive data, also they have control on device.  Mobile Operating System Access Permissions:
Attacker can also steal fingerprints data and used as Discussed in mobile application user threats.
provider authentication and use money of customer The Possible Vulnerabilities of Mobile Wallet Apps are:
by fraudulent transactions. If the viruses and malware  Hardcoded secrets as private keys.
affected in stolen device then it is very real danger of  Missing to disable code debugging routines.
lost or it affects consumer’s digital live.  Unsigned production binaries.
 Data interception via installation of malware: The  Credit card provisioning weaknesses like stolen
installation of malware/rootkits[11] can be allowed credit cards to affect sensitive data.
by drive by download attacks influence. For example,  Weaknesses in biometric identification for initial
WebKit to root level access, or by side-loading of authorization of transactions.
malware alongside reliable or semi reliable apps
 S/W vulnerabilities and weaknesses in third party
downloaded from the various stores.[7]
applications that provide access to mobile wallets.
 Mobile as a target: Mobile devices are mostly
 Weaknesses in payment authorization provisioning
targeted by attackers because once mobile is in their
with mobile paired smartwatch device.
control they can use for any malicious attack like
 Credit/debit card not stored encrypted in Secure
fraud transaction, use sensitive data, install spyware,
Element or processed in Trusted Execution
etc. It is easy for attacker to attack on mobile device
Environment.
then mobile app.
 Weak PINs exposing them to brute force attacks.
 Implementation Issues: In a competitive market, all
the payment providers are not going to stand still. It  Insecure communication channels with Point of Sale
is predicted that new functionality will be (POS) contactless terminals.
continuously released. As such, there is a risk to run  Insecure tokens used in Magnetic Secure
potentially immature code which may be prone to Transmission (MST) connections.
security issues on different implementation of mobile  Poor signal strength for MST processing.
wallet payment application. Possible Security Measures of Mobile Wallet Applications
The Possible Vulnerabilities of mobile devices are:  Adopt secure coding practices and secure code
 No PIN lock set or PINs set to weak PINs. reviews manual and automated via tools.
 No remote devices lock set and no remote data wipe  Source code complication an untrusted code
set. detection.
 Not up-to-date OS to connect and use untrusted  Anti-debug and Integrity source code protections.
device.  White-box cryptography.
Possible Security Measures of Mobile Devices  Secure application provisioning through trusted
 Remote device lock and Remote data wipe. application stores.
 PIN lock and Strong PINs.  Takedown rogue applications from unauthorized
application stores.
D. Merchants Threats contactless terminals that PSPs provide to merchants to
 Uploading malware (POS) on the POS contactless host on their premise/network.
payment terminal: Once the Point of Sale  Data connectivity compromise: Merchant hosted POS
(POS)malware is installed on the POS contactless connection to Payment Service Provider (PSP) and
terminal it can be configured by the attacker to from PSP to acquirer at that time Attackers might try to
remotely steal mobile wallet payment data that transact exploit insecure connections.
through the card readers. Uploading POS malware has
insecure remote desktop access to POS servers.[7] It The possible Vulnerabilities Payment Service Providers are:
also affects the cryptogram and possibility of fraud  Design flaws and un-patched S/W vulnerabilities in
payments. POI terminal/credit card machines and POS systems
and payment gateways to/from acquirers.
 Man-in-the-Middle (MiTM) attacks against the POS
 Insecure point to point connections between
contactless terminal and POS server connections:
Attackers can also attempt to exploit network security merchant POS server and PSP and between PSP and
weaknesses such as lack of firewalls. acquirers.
Possible Security Measures of Payment Service Provider
 Relay attacks against NFC enabled POS contactless  Secure by-default design.
terminal: A known attack against the NFC POS  Vulnerability testing
interface is the relay attack. [7] Relay software  Patching of POI terminal (card machines) H/W and
installed on the mobile can relay commands and
S/W.
responses between the Secure Element and a card
emulator that is installed as proxy on the mobile POS  Fix S/W vulnerabilities in POI.
across a wireless network.  POI and payment gateways hosted at the payment
service providers.
The Possible Vulnerabilities of Merchants are:  Enforce secure point to point connections between
 Use of default password to access POS terminals merchant POS and PSP and between PSP and
available online. acquirers.
 POS and POI security misconfigurations and security
hygiene such as keeping software up to date, patching F. Acquirers Threats
systems, etc.  Payment processing systems compromise: When
 Insecure connections between POI and POS requesting token and cryptogram from the issuer
 Insecure access to LAN and to POS systems payment network, attacker obtains large amount of
 Lack of enforcement of minimum privileges for POI cardholder data.
and POS access  Installation of malware/RAT for Advanced Persistent
Possible Security Measures/Controls of Merchants Threats (APTs): Attackers might seek to compromise
 Change default passwords on POS systems and keep the acquirer bank payment processing servers from the
POS software up to date. inside of the network. Installation of malware at
 Use SSL between POS connection point (POI to backdoors and Remote Access Tools (RAT) via
POS). malware infection of the servers hosted at the acquired
 Deploy and configure firewalls. network.
 Restrict POI and POS access to authorized users.  Installation of rootkits: Rootkits are a significant threat
vector and can also be leveraged to directly monitor
and hijack/manipulate API calls.
E. Payment Service Providers Threats
 Compromise of S/W running on contactless terminals:  Data connectivity (external from acquirer to issuer and
Payment Service Providers (PSPs) provide POS internal among servers) compromise: Attackers might
contactless terminals for mobile payments e.g. for NFC try to exploit insecure point to point connections
enabled POS terminals as well as aggregated payment between acquirer and issuer through network service
services for merchants by processing data from provider network to conduct attacks.[7]
different channels including face to face (card present)  Repudiation of mobile payment authorization:
payments, online payments and mobile/contactless Repudiation attacks such as to repudiate a payment
payments.[7] authorization from an issuer can be facilitated by
 Compromise of Payment Gateways: PSP payment exploits of design flaws in the implementation of
gateways represent an interesting target for attackers payment processing services by the acquirers.[7]
that seek to compromise the payment data in transit The Possible Vulnerabilities Acquirers are:
from the merchants to the different acquiring banks.
 Un-authorized access to payment processing
 Compromise of S/W installed on POS Servers: systems/applications and weaknesses in enforcement
Attackers might seek to compromise to attack on of internal security controls and measures to access
payment gateway and break the security of POS these systems.
 Non-effective malware detection, data outflow Possible Security Measures of Payment Network Provider
detection/prevention and fraud detection/prevention.  Secure configuration and hardening of critical
 Insecure external and internal point to point system servers.
connections.  Secure key storage in hardware encrypted security
 Weak server to server authentication among internal modules.
systems.  Dual controls and strong authentication 2FA to
 Gaps in non-repudiation controls for processing access the token vault.
authorizations such as out of band  Enforcement of End to End encryption for protecting
verification/confirmation of suspicious transactions cardholder data in transit to issuer.
and digital signing of transactions.  Anti-DOS measures are application and network
Possible Security Measures of Acquirers layer to protect token services.
 Enforce high security standard measures for payment
processing systems and second factor authentication
H. Card Issuers Threats
(2FA) for user authentication/access.
 Enforce minimum privileges for user access.  Credit card Enrolment: The first step to use a mobile
 Deploy malware detection, data leakage and fraud payment is the enrolment of the user's credit cards into
prevention. the app. The provider cannot concern about card holder
or user. This is something that only the card issuer can
 Secure internal point to point connections with know. Providers facilitate issuer’s decision making by
SSL/mutual authentication. providing information to accept or not.
 Require digital signatures to sign and verify payment
authorizations from issuer.  Payment authorization process compromise: An
internal attacker at the card issuer bank or an external
attacker that gained access to critical servers may
G. Payment Network Providers Threats attempt to bypass fraud controls e.g. changing the card
 Compromise Token Services: Tokenization services payment limits.
will become a single point of failure, something similar  Confidential cardholder data compromise through
to DNS infrastructure. Token must be irredundant malware/APT: Credit and debit accounts mostly target
rather than like DNS. Additionally, they will become a for commit fraud or reselling accounts information in
prime target as they will map real PANs. black market. It can attack user’s sensitive data to
 Compromise Token services provider servers: Token attack in banks databases. Possible attacks are first,
Services Providers (TSP) provide token management using social engineering authenticate bank and access
services such as tokenization, de-tokenization and databases, and second, Advanced Persistent Threats
validation of the token data integrity and origination (APTs) that seek to install malware to target encryption
token and validation with cryptograms. keys or supplementary data.
 Denial of payment settlement services: Attacks  Payment fraud: Payment fraud detection should occur
targeting the availability of token services hosted by at fraudulent mobile payments transactions, enforce
payment network organization will impact the credit card limits on the payment transactions
authorization of mobile payments and possibly also for themselves and on the debit cards amounts linked to
payments originating from other channels that also use consumer direct bank accounts managed by the issuer
these token services.[7] bank.
 Data connectivity compromise: Insecure connections  Token services data compromise: Issuers can choose to
to/from acquirers and issuers. Thus, the attacker may leverage the tokenization service from the payment
attack on this weak connection may stole the sensitive networks or implement their own token service and
data. become a Token Service Provider themselves, they will
be at increased risk of threats against token data
 Device and mobile network reliability: the mobile confidentiality, integrity and availability.
device and network were considered unreliable for
payments. The Possible Vulnerabilities of Card Issuer are:
 Weaknesses in enforcing strong authentication for
The Possible Vulnerabilities of Payment Network Provider access to critical systems and databases where
are: cardholder data is stored for validation and payment
 Misconfiguration of servers providing tokenization authorization to acquirer.
services by Non-secure key storage.  Non-effective malware detection and prevention
 Insecure user access to the token vault. measures.
 Insecure connections to/from acquirers and issuers.  Misconfiguration of fraud detection systems
 Weaknesses in protection of Denial of Service (DOS) including rules such as positive payment checks, max
attacks against TSP service.
limit amount per transaction, daily limits, velocity  Transaction errors: The errors could be caused by the
tagging. payment system or by their own mistakes in the system
Possible Security Measures of Card Issuer use.
 Enforce strong multi-factor authentication for access  Lack of transaction record and documentation: It
to critical systems where credit cardholder data is difficult to follow up the amount of payments made
being stored. with a mobile phone since they did not get any receipt
 Enforce minimum privileges for users that have or other efficient means to keep track of the payments.
access to internal critical systems used for verify
cardholder data and authorize payments based upon  Ambiguity of the transaction: The lack of control when
specific business rules. paying with a mobile phone. They were unsure of
whether the payment had taken place or not and
 Deploy malware detection and prevention, suspicious
whether the payment had been charged or not.
activity detection rules based upon aggregated log
analysis.  Third party trust: Regardless of the mobile payment
 Configure fraud detection and prevention systems provider, enrolling on the system requires a certain
and enforce fraud management rules for mobile level of trust on the third party.
payment transactions.  Privacy issues: some of the respondents were unwilling
to trust their personal information with the payment
I. Mobile Payment Applications Providers (Servers & Cloud service providers. They were concerned that their
Services) Threats purchases would be tracked or that they would begin to
receive a lot of advertisements.
 Compromise of cardholder’s sensitive data: Attackers
might direct their effort to cardholder credit/debit data The Possible Vulnerabilities Mobile Payment Application
and personal data of the user that is stored by the Provider are:
mobile payment service provider.[7] This data  Weaknesses and vulnerabilities on digital wallet
compromise might also occur during transmission at servers and applications hosted at the mobile
the time of card enrollment. payment application provider.
 Compromise of the user profile managed in the cloud:  Absence of malware detection and prevention on
Since the mobile application has access to the mobile critical servers that provide access servers where
payment servers. At the time of card enrolment an cardholder data and user profiles are stored.
attacker could enroll stolen credit data with the mobile  Gaps in deployment of 2FA to access servers and
card enrolment service, to abuse non-authorized access maker/checker controls.
to the user profile managed at the mobile payment  Absence of fraud detection and prevention for use of
provider, and to change accounts sensitive data to stolen credit card holder for enrolment in mobile
facilitate fraud.[7] payment applications.
 Token service data compromise: Since mobile payment  Weaknesses in anti-DoS measures to prevent DoS
providers can also implement their own token service against digital wallet and account profile services
they are also at risk of threats against the token hosted in data centers and cloud services.
management process that encrypt and decrypt tokens, Possible Security Measures of Mobile Payment Application
the management of keys and the integrity and Provider
availability of the tokens issued for payment  Enforce information security policies and processes
authorizations. [7] requiring identification and remediation of
 DDoS attacks: DDoS attacks by threat actors seeking vulnerabilities in servers and applications.
to interrupt mobile payment services. These might  Deploy malware detection and prevention measures.
affect transactions relates services hosted in the cloud.  Enforce 2FA for internal user’s access to critical
servers such as digital wallet services where
 Enrolment of stolen credit card data entry: Enrolment cardholder data and user profile information is stored.
of stolen credit card data for use of mobile payment by  Enforce user entitlements and minimum privileges.
fraudsters. Attacker uses the phone’s camera, memory
 Deploy fraud detection and prevention for high risk
scraping, OCR recognition, etc. information and sent
on cloud to gain access the network traffic of user’s functions such as change of account profile, credit
data. The attacker could masquerade passbook and card enrolment and payment transactions.
steal card information.  Deploy anti-DoS measures for critical servers hosted
in data centers and in the cloud.
 Accountability for payment transactions: Payment
providers require fingerprint authentication to perform CONCLUSION
the payment. As individual by figure print and more Potential mobile wallet threats and vulnerability have
than one device access creates accountability shortly discussed and studied in this paper. However, the
identification failure in mobile payments. threats are identified yet not reached to the expected level of
maturity, as a result the overall field proceeds to be an area of [23] Zvelo, “Google Wallet Security: PIN Exposure Vulnerability”,
intense research. Also need to identify new solutions for https://zvelo.com/google-wallet-security-pin-exposure-vulnerability/
specific threats or vulnerability. Due to fast development of [24] Wonder How To, “ Apple Watch Vulnerability Lets Thieves Use Apple
Pay Without Your PIN”, http://ios.wonderhowto.com/how-to/apple-
mobile wallets most of solutions are already implemented. watch-vulnerability-lets-thieves-use-apple-pay-without-your-pin-
This paper also indicates that if the new solution is identified 0161940/
then defiantly increases the “trust boundaries” of mobile [25] http://viaforensics.com/mobile-security/forensics-security-analysis-
wallet payments. google-wallet.html
[26] MIT Technology Review, “Is Google Wallet Safe ?”,
REFERENCES https://www.technologyreview.com/s/426921/is-google-wallet-safe/
[27] Choi, Daeseon, and Younho Lee. "Eavesdropping One-Time Tokens
[1] Dahlberg, Tomi, Niina Mallat, and Anssi Öörni. "Trust enhanced Over Magnetic Secure Transmission in Samsung Pay." In WOOT. 2016.
technology acceptance model-consumer acceptance of mobile payment
solutions: Tentative evidence." Stockholm Mobility Roundtable 22 [28] Trend Micro Discovers MalumPoS; Malware Targeting Hotels and other
(2003): 23. US Industries http://blog.trendmicro.com/trendlabs-security-
intelligence/trend-micro-discovers-malumpos-targets-hotels-and-other-
[2] Hoofnagle, Chris Jay, Jennifer M. Urban, and Su Li. "Mobile payments: us-industries/
Consumer benefits & new privacy concerns." (2012).
[29] https://www.goodreturns.in/classroom/2016/11/types-mobile-wallets-
[3] Kasiyanto, Safari. "Security Issues of New Innovative Payments and their-difference-518655.html
Their Regulatory Challenges." In Bitcoin and Mobile Payments, pp.
145-179. Palgrave Macmillan UK, 2016. [30] http://www.dqindia.com/top-6-mobile-wallets-in-india/2/
[4] Khiaonarong, Tanai. "Oversight issues in mobile payments.", IMF [31] http://www.iamwire.com/2016/11/list-of-mobile-wallets-upi-payment-
Working Paper (July 2014). apps-in-india/145172
[5] Hohl, Fritz. "Time limited blackbox security: Protecting mobile agents
from malicious hosts." Mobile agents and security (1998): 92-113.
[6] Simplot-Ryl, Isabelle, Issa Traoré, and Patricia Everaere. "Distributed
architectures for electronic cash schemes: a survey 1." International
Journal of Parallel, Emergent and Distributed Systems 24, no. 3 (2009):
243-271.
[7] Security of Mobile Payments and Digital Wallets, ENISA December
2016, https://www.enisa.europa.eu/publications/mobile-payments-
security/at_download/fullReport
[8] Allen, Hellen, 2003, “Innovations in Retail Payments: E-Payments”,
Bank of England Quarterly Bulletin, Winter, pp. 428-438.
[9] Diniz, Eduardo Henrique, João Porto de Albuquerque, and Adrian
Kemmer Cernev. "Mobile Money and Payment: a literature review
based on academic and practitioner-oriented publications (2001-2011)."
(2011).
[10] Urban, Jennifer. 2016. “Mobile Payments: Consumer Benefits & New
Privacy Concerns”. SocArXiv. July 18. osf.io/preprints/socarxiv/7pnxz.
[11] Papathanasiou, Christian, and Nicholas J. Percoco. "This is not the droid
you're looking for..." Def Con 18 (2010).
[12] Davis, Michael, Sean Bodmer, and Aaron LeMasters. Hacking Exposed
Malware and Rootkits. McGraw-Hill, Inc., New York, NY, USA, 2009.
[13] The Great Bank Robbery: Carbanak APT
https://business.kaspersky.com/the-great-bank-robbery-carbanak-
apt/3598/
[14] FIDO Alliance, “Specifications Overview”,
http://fidoalliance.org/specifications/overview/
[15] https://en.wikipedia.org/wiki/Mobile_payment
[16] European Central Bank, “Recommendations For The Security of Mobile
Payments”, https://www.ecb.europa.eu/paym/cons/pdf/131120/
recommendationsforthesecurityofmobilepaymentsdraftpc201311en.pdf
[17] ENISA,” Mobile Identity Management”,
https://www.enisa.europa.eu/publications/Mobile%20IDM
[18] Drop Labs, “Rampant: Explaining the Current State of Apple Pay
Fraud”, http://www.droplabs.co/?p=1231
[19] Apple, “About EMV and Apple Pay for Merchants”,
https://support.apple.com/en-us/HT205645
[20] ISACA, ”2015 Mobile Payment Security Study”,
https://www.isaca.org/Pages/mobile-payment-security-study.aspx
[21] Mobile Payment in Your Business",
https://www.intelligenthq.com/resources/the-3-biggest-benefits-of-
implementing-mobile-payment-in-your-business/
[22] Salvador Mendoza, “Samsung Pay: Tokenized Numbers, Flaws and
Issues”, https://www.blackhat.com/docs/us-16/materials/us-16-
Mendoza-Samsung-Pay-Tokenized-Numbers-Flaws-And-Issues-wp.pdf

View publication stats

You might also like