An introspection-based memory scraper attack against virtualized Point of Sale systems

1Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Retail industry Point of Sale (POS) computer systems are frequently targeted by hackers for credit/debit card data. Faced with increasing security threats, new security standards requiring encryption for card data storage and transmission were introduced making harvesting card data more difficult. Encryption can be circumvented by extracting unencrypted card data from the volatile memory of POS systems. One scenario investigated in this empirical study is the introspection-based memory scraping attack. Vulnerability of nine commercial POS applications running on a virtual machine was assessed with a novel tool, which exploited the virtual machine state introspection capabilities supported by modern hypervisors to automatically extract card data from the POS virtual machines. The tool efficiently extracted 100% of the credit/debit card data from all POS applications. This is the first detailed description of an introspection-based memory scraping attack on virtualized POS systems. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Hizver, J., & Chiueh, T. C. (2012). An introspection-based memory scraper attack against virtualized Point of Sale systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7126 LNCS, pp. 55–69). https://doi.org/10.1007/978-3-642-29889-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free