<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; PIN</title>
	<atom:link href="https://javacard.vetilles.com/tag/pin/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>About PIN, the iPhone is about 20 years behind smart cards</title>
		<link>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/</link>
		<comments>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/#comments</comments>
		<pubDate>Mon, 30 Mar 2015 13:07:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[PIN]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=17472</guid>
		<description><![CDATA[I was astonished when I read this article on breaking the iPhone PIN. Some guy has built a device that can guess your iPhone PIN, and he is using a very old trick that was performed on cards years ago. Of course, the exercise is pointless; as noted in the original article, Apple can (will) [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I was astonished when I read this article on <a href="https://www.schneier.com/blog/archives/2015/03/brute-forcing_i.html" class="liexternal">breaking the iPhone PIN</a>. Some guy has built a device that can guess your iPhone PIN, and he is using a very old trick that was performed on cards years ago. Of course, the exercise is pointless; as noted in <a href="https://nakedsecurity.sophos.com/2015/03/17/black-box-brouhaha-breaks-out-over-brute-forcing-of-iphone-pin-lock/" class="liexternal">the original article</a>, Apple can (will) update their phones very soon, making the device pointless.</p>
<p>The attack consists in detecting whether the PIN code is right or wrong (here, through some change in display intensity) before the number of false PIN presentations is incremented in persistent memory. Upon detection, the phone is immediately rebooted, and the increment doesn&#8217;t happen. Yeaahh!!</p>
<p>Similar attacks have been performed on smart cards for over 20 years. The attackers used to monitor the power consumption when verifying a PIN, and an increase in consumption (indicating a memory write) would indicate the beginning of an EEPROM update, and the right time to cut power.</p>
<p>The solution? Most people typically look for complex implementations, but the general solution is much simpler: just increment your counter of failed attempts before actually performing the comparison (and ensure that the actual memory update has been performed, not just cached). Then, no need to worry about power cuts and reboots, since the attacker will not get additional attempts.</p>
<p>I will tend to believe that most (all?) Java Card implementations of the <code>OwnerPIN</code> class include such countermeasures, providing adequate protection for a PIN comparison. And by the way, since recent iPhone&#8217;s include a Secure Element, this is where the PIN comparison belongs.</p>
<p>For more details on PIN attacks and countermeasures, you can read my tutorial <a href="http://javacard.vetilles.com/2008/05/15/jc101-12c-defending-against-attacks/" class="liinternal">JC101-12C: Defending against attacks</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>PINs still under attack!</title>
		<link>https://javacard.vetilles.com/2011/08/27/pins-still-under-attack/</link>
		<comments>https://javacard.vetilles.com/2011/08/27/pins-still-under-attack/#comments</comments>
		<pubDate>Sat, 27 Aug 2011 20:38:15 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[ATM]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[PIN]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[smartphone]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=734</guid>
		<description><![CDATA[This summer was very interesting for new attacks. There are two that I really liked, for very different reasons. They are also both attacks on PIN codes, yet they are quite different. The first one is an attack on ATMs, with a thermal camera, hoping that your fingers stay on the keys long enough to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This summer was very interesting for new attacks. There are two that I really liked, for very different reasons. They are also both attacks on PIN codes, yet they are quite different.</p>
<p>The first one is an <a href="http://www.usenix.org/events/woot11/tech/final_files/Mowery.pdf" class="lipdf">attack on ATMs</a>, with a thermal camera, hoping that your fingers stay on the keys long enough to heat them up. Well, it seems that if all conditions are good, the trick can work. The great thing about this attack is that it naturally captures the order (the warmest key is the last one). The attack even works well in optimal conditions (recovering half of the PIN codes after one minute), which sounds good, even a bit alarming.</p>
<p>Luckily, it is quite sensitive to various conditions, like the material in which the keys are made (plastic seems better for the attack than metal, which conducts heat away too easily). Having cold fingers also is a good security measure, since the amount of heat transferred is lower. The researchers haven&#8217;t tried it, but the temperature of the environment should also have some influence. So, against this attack, I guess that selecting an ATM in full sun, with metal keys (the authors&#8217; recommendation) and wearing gloves should make it.</p>
<p>The second attack is about using a smartphone&#8217;s <a href="http://regmedia.co.uk/2011/08/17/touchlogger_research_paper.pdf" class="lipdf">motion sensor to guess</a> a PIN code typed on it. Of course, when you type on a smartphone while holding it, you apply some pressure on the screen, and the result in terms of movement depends on where you type. It doesn&#8217;t work as well as the previous attacks, but apparently, they get over 70% of the digits typed on a 10-digit keyboard.</p>
<p>The obvious countermeasure is to make sure that your phone is safely lying on a table, which will severely limit any movement. In terms of countermeasure, this also raises the bar for people who are developing systems that protect the touchscreen: well, you may as well protect the motion sensors, because if a hacker controls that, he may just get the PIN code that we want to protect. Of course, that &#8216;s until another attack comes, using another sensor.</p>
<p>For me, these two attacks have in common to be absolutely obvious. You just read the title of the paper and you think &#8220;Of course, this is nice&#8221;. And yet, they are quite practical, and they can become a real problem for real people. They also both rely on using a disruptive attack technology: PIN protection requirements usually don&#8217;t consider thermal cameras and motion sensors as potential threats, but they may in he future. This is another reminder that security is a wonderful job, because as soon as you have covered all known threats, new ones come up that you also need to cover. </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2011/08/27/pins-still-under-attack/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
