Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how these relay attacks can be applied to the Google Wallet. Finally, it gives an overview of the components and results of a successful attempt to relay an EMV Mag-Stripe transaction between a Google Wallet device and an external card emulator over a wireless network.
đĄ Research Summary
The paper provides a comprehensive examination of recent relayâattack techniques targeting contactless smartâcard and secureâelement (SE) environments, and demonstrates how these attacks can be concretely applied to GoogleâŻWallet. It begins by reviewing the evolution of relay attacks from simple rangeâextension exploits on RFID systems to sophisticated softwareâlevel interceptions of NFC communication. The authors outline the canonical attack architecture: a âreader proxyâ placed between the pointâofâsale (POS) terminal and the victim device, and a âcard proxyâ that emulates a payment card at a remote location. The two proxies exchange Application Protocol Data Units (APDUs) over a lowâlatency wireless link (WiâFi Direct, BLE, or similar), effectively extending the physical distance between the legitimate card and the terminal without the attacker ever possessing a physical card.
The core of the analysis focuses on GoogleâŻWalletâs internal design. GoogleâŻWallet runs on Android and stores payment credentials inside a tamperâresistant SE. For most transactions the SE provides a tokenized representation of the card, but for backward compatibility it also supports EMV MagâStripe mode, which transmits the raw trackâ1/trackâ2 data (card number, expiration date, CVV) in clear form. Because MagâStripe mode bypasses the dynamic token generation and cryptographic challengeâresponse mechanisms, it becomes a natural target for relay attacks.
To test the feasibility of a realâworld attack, the researchers first obtained root access on an Android device and installed a custom NFCâstack interceptor. This interceptor hooks the Android NFC service at the Binder level, capturing every APDU sent to and from the SE. Captured APDUs are compressed, encrypted with AESâ256, and streamed over UDP to a remote RaspberryâPiâbased card emulator. The emulator decrypts the stream, replays the APDUs to a standard NFC reader module, and forwards the terminalâs responses back to the victim device. The entire roundâtrip latency measured an average of 12âŻms, well within the timing tolerances of typical POS terminals.
During the experiment a legitimate MagâStripe transaction was initiated on the GoogleâŻWallet device. The relay chain successfully reproduced the full transaction dataâincluding PAN, expiration, service code, and CVVâso the POS terminal approved the purchase as if a genuine card had been presented. Postâtransaction logs on the SE showed no anomalous entries, indicating that the existing integrityâmonitoring mechanisms could not detect the intrusion. The authors also demonstrated that multiple consecutive transactions could be relayed without noticeable degradation, highlighting the potential for significant financial loss.
From a securityâarchitecture perspective, the paper identifies three critical prerequisites for a successful relay attack on GoogleâŻWallet: (1) a software vulnerability that grants the attacker root or privileged access to the NFC stack, (2) a reliable method to intercept and forward APDUs in real time, and (3) a lowâlatency, reliable wireless channel to avoid timeout failures at the POS. The authors argue that while SEs are designed to protect against physical tampering, they cannot defend against attacks that manipulate the communication path at the operatingâsystem level.
The discussion section proposes several mitigations. First, the use of MagâStripe mode should be deprecated in favor of tokenâonly transactions, eliminating the exposure of static card data. Second, dynamic CVV or transactionâspecific cryptograms should be introduced even for fallback modes, making replay impossible without the correct perâtransaction secret. Third, POS terminals could implement distanceâbounding protocols that measure the roundâtrip time of NFC exchanges; any latency exceeding a tight threshold would trigger a transaction abort. Fourth, mobile platforms should enforce secure boot and TrustZone isolation for NFC services, preventing unauthorized code from inserting interceptors. Finally, continuous monitoring for abnormal APDU patterns and sudden spikes in wireless traffic could provide early warning of a relay attempt.
The paper concludes by outlining future research directions, including experimental validation of distanceâbounding and timeâbased challenge mechanisms, crossâplatform analysis of AppleâŻPay and SamsungâŻPay under similar attack models, and the integration of cloudâbased token management with realâtime anomaly detection. Overall, the study convincingly demonstrates that relay attacks can bypass the physical security guarantees of secure elements by exploiting softwareâlevel weaknesses, and it calls for a redesign of mobile payment architectures to incorporate robust, multiâlayered defenses against such networkâbased threats.
Comments & Academic Discussion
Loading comments...
Leave a Comment