Page 27 - ITU-T Focus Group Digital Financial Services – Technology, innovation and competition
P. 27

ITU-T Focus Group Digital Financial Services
                                              Technology, Innovation and Competition



               attacks that can be widely packaged and deployed. Device manufacturers must be involved to ensure that
               critical updates are part of the device life cycle.

               R7 – Ensure that security libraries offered by the operating system are correctly designed and implemented
               and that the cipher suites they support are sufficiently strong. This will help to address risks to confidentiality
               as detailed above.
               R8 – The handset operating system should be configured in a way to reduce the size of the trusted computing
               base. This is an essential part of secure operating system design and is crucial to reducing the attack surface.
               Usability indicators for end users interacting with the operating system can also help make clear when users
               are potentially operating on compromised documents containing malware. Integration of operating system
               services with secure hardware facilities on the mobile platform (e.g., trusted execution environments and
               secure enclaves on the chip, can further protect operating systems against compromise.


               3.4    Mobile phone SIM card


               Role within the ecosystem

               The SIM card is an integrated circuit chip that is intended to securely store the international mobile subscriber
               identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile
               telephony devices. In some cases, the SIM card is used as a secure element for storage of sensitive data
               and execution of applications, particularly in early-generation feature phones where tools such as the SIM
               Application Toolkit can provide functionality directly through the SIM card’s capabilities, which many mobile
               banking applications take advantage of. In smartphones, the SIM card can still be leveraged to retrieve
               information about customer identity, but per Recommendation [ITU-T Y.2740], high security level DFS should
               use their own authentication credentials.


               Security threats and vulnerabilities


               Access control
               Past work has demonstrated that SIM cards are vulnerable to privilege escalation attacks based on a variety
               of threat vectors. Over-the-air updates to SIM cards that arrive via SMS messaging have been shown to use
               the insecure DES cipher [3], which is very easy to compromise. The result of a cracked update to a SIM card
               includes the ability to compromise Java applications on board the card, some of which have been demonstrated
               to be vulnerable. This could potentially allow for cloning of IMSIs and SIM authentication keys, allowing for
               vast unauthorized access to mobile services.


               Authentication

               Based on the attack against SIM card updates detailed above, coupled with the potential issues with Java
               virtual machine implementations on Java SIM cards, an adversary can perform cloning attacks against a user’s
               mobile identity, putting many copies of these credentials out into the open. Such an attack would compromise
               authentication.


               Non-repudiation

               There are no facilities for non-repudiation at the SIM level, given the lack of digital signature usage.


               Data confidentiality
               Data confidentiality is at risk based on the insecure SIM updates that are performed with known-weak ciphers
               such as DES and A5/1.




                                                                                                       13
   22   23   24   25   26   27   28   29   30   31   32