Home > Research > Publications & Outputs > A Formal Security Analysis of the W3C Web Payme...

Links

Text available via DOI:

View graph of relations

A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. / Do, Quoc Huy; Hosseyni, Pedram; Küsters, Ralf et al.
43rd IEEE Symposium on Security and Privacy (S&P 2022). IEEE, 2022.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Do, QH, Hosseyni, P, Küsters, R, Schmitz, G, Wenzler, N & Würtele, T 2022, A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. in 43rd IEEE Symposium on Security and Privacy (S&P 2022). IEEE. https://doi.org/10.1109/SP46214.2022.9833681

APA

Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N., & Würtele, T. (2022). A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. In 43rd IEEE Symposium on Security and Privacy (S&P 2022) IEEE. https://doi.org/10.1109/SP46214.2022.9833681

Vancouver

Do QH, Hosseyni P, Küsters R, Schmitz G, Wenzler N, Würtele T. A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification. In 43rd IEEE Symposium on Security and Privacy (S&P 2022). IEEE. 2022 Epub 2022 May 22. doi: 10.1109/SP46214.2022.9833681

Author

Do, Quoc Huy ; Hosseyni, Pedram ; Küsters, Ralf et al. / A Formal Security Analysis of the W3C Web Payment APIs : Attacks and Verification. 43rd IEEE Symposium on Security and Privacy (S&P 2022). IEEE, 2022.

Bibtex

@inproceedings{765b0c806aaa41d6941566c672bae9bd,
title = "A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification",
abstract = "Payment is an essential part of e-commerce. Merchants usually rely on third-parties, so-called payment processors, who take care of transferring the payment from the customer to the merchant. How a payment processor interacts with the customer and the merchant varies a lot. Each payment processor typically invents its own protocol that has to be integrated into the merchant{\textquoteright}s application and provides the user with a new, potentially unknown and confusing user experience.Pushed by major companies, including Apple, Google, Master-card, and Visa, the W3C is currently developing a new set of standards to unify the online checkout process and “streamline the user{\textquoteright}s payment experience”. The main idea is to integrate payment as a native functionality into web browsers, referred to as the Web Payment APIs. While this new checkout process will indeed be simple and convenient from an end-user perspective, the technical realization requires rather significant changes to browsers.Many major browsers, such as Chrome, Firefox, Edge, Safari, and Opera, already implement these new standards, and many payment processors, such as Google Pay, Apple Pay, or Stripe, support the use of Web Payment APIs for payments. The ecosystem is constantly growing, meaning that the Web Payment APIs will likely be used by millions of people worldwide.So far, there has been no in-depth security analysis of these new standards. In this paper, we present the first such analysis of the Web Payment APIs standards, a rigorous formal analysis. It is based on the Web Infrastructure Model (WIM), the most comprehensive model of the web infrastructure to date, which, among others, we extend to integrate the new payment functionality into the generic browser model.Our analysis reveals two new critical vulnerabilities that allow a malicious merchant to over-charge an unsuspecting customer. We have verified our attacks using the Chrome implementation and reported these problems to the W3C as well as the Chrome developers, who have acknowledged these problems. Moreover, we propose fixes to the standard, which by now have been adopted by the W3C and Chrome, and prove that the fixed Web Payment APIs indeed satisfy strong security properties.",
author = "Do, {Quoc Huy} and Pedram Hosseyni and Ralf K{\"u}sters and Guido Schmitz and Nils Wenzler and Tim W{\"u}rtele",
year = "2022",
month = jul,
day = "27",
doi = "10.1109/SP46214.2022.9833681",
language = "English",
isbn = "9781665413176",
booktitle = "43rd IEEE Symposium on Security and Privacy (S&P 2022)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - A Formal Security Analysis of the W3C Web Payment APIs

T2 - Attacks and Verification

AU - Do, Quoc Huy

AU - Hosseyni, Pedram

AU - Küsters, Ralf

AU - Schmitz, Guido

AU - Wenzler, Nils

AU - Würtele, Tim

PY - 2022/7/27

Y1 - 2022/7/27

N2 - Payment is an essential part of e-commerce. Merchants usually rely on third-parties, so-called payment processors, who take care of transferring the payment from the customer to the merchant. How a payment processor interacts with the customer and the merchant varies a lot. Each payment processor typically invents its own protocol that has to be integrated into the merchant’s application and provides the user with a new, potentially unknown and confusing user experience.Pushed by major companies, including Apple, Google, Master-card, and Visa, the W3C is currently developing a new set of standards to unify the online checkout process and “streamline the user’s payment experience”. The main idea is to integrate payment as a native functionality into web browsers, referred to as the Web Payment APIs. While this new checkout process will indeed be simple and convenient from an end-user perspective, the technical realization requires rather significant changes to browsers.Many major browsers, such as Chrome, Firefox, Edge, Safari, and Opera, already implement these new standards, and many payment processors, such as Google Pay, Apple Pay, or Stripe, support the use of Web Payment APIs for payments. The ecosystem is constantly growing, meaning that the Web Payment APIs will likely be used by millions of people worldwide.So far, there has been no in-depth security analysis of these new standards. In this paper, we present the first such analysis of the Web Payment APIs standards, a rigorous formal analysis. It is based on the Web Infrastructure Model (WIM), the most comprehensive model of the web infrastructure to date, which, among others, we extend to integrate the new payment functionality into the generic browser model.Our analysis reveals two new critical vulnerabilities that allow a malicious merchant to over-charge an unsuspecting customer. We have verified our attacks using the Chrome implementation and reported these problems to the W3C as well as the Chrome developers, who have acknowledged these problems. Moreover, we propose fixes to the standard, which by now have been adopted by the W3C and Chrome, and prove that the fixed Web Payment APIs indeed satisfy strong security properties.

AB - Payment is an essential part of e-commerce. Merchants usually rely on third-parties, so-called payment processors, who take care of transferring the payment from the customer to the merchant. How a payment processor interacts with the customer and the merchant varies a lot. Each payment processor typically invents its own protocol that has to be integrated into the merchant’s application and provides the user with a new, potentially unknown and confusing user experience.Pushed by major companies, including Apple, Google, Master-card, and Visa, the W3C is currently developing a new set of standards to unify the online checkout process and “streamline the user’s payment experience”. The main idea is to integrate payment as a native functionality into web browsers, referred to as the Web Payment APIs. While this new checkout process will indeed be simple and convenient from an end-user perspective, the technical realization requires rather significant changes to browsers.Many major browsers, such as Chrome, Firefox, Edge, Safari, and Opera, already implement these new standards, and many payment processors, such as Google Pay, Apple Pay, or Stripe, support the use of Web Payment APIs for payments. The ecosystem is constantly growing, meaning that the Web Payment APIs will likely be used by millions of people worldwide.So far, there has been no in-depth security analysis of these new standards. In this paper, we present the first such analysis of the Web Payment APIs standards, a rigorous formal analysis. It is based on the Web Infrastructure Model (WIM), the most comprehensive model of the web infrastructure to date, which, among others, we extend to integrate the new payment functionality into the generic browser model.Our analysis reveals two new critical vulnerabilities that allow a malicious merchant to over-charge an unsuspecting customer. We have verified our attacks using the Chrome implementation and reported these problems to the W3C as well as the Chrome developers, who have acknowledged these problems. Moreover, we propose fixes to the standard, which by now have been adopted by the W3C and Chrome, and prove that the fixed Web Payment APIs indeed satisfy strong security properties.

U2 - 10.1109/SP46214.2022.9833681

DO - 10.1109/SP46214.2022.9833681

M3 - Conference contribution/Paper

SN - 9781665413176

BT - 43rd IEEE Symposium on Security and Privacy (S&P 2022)

PB - IEEE

ER -