论文标题
支付卡行业的安全认证:测试床,测量和建议
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations
论文作者
论文摘要
大规模支付卡行业(PCI)涉及商人,发行人银行,收购方和卡品牌等各种实体。确保所有处理支付卡信息的实体安全是一项具有挑战性的任务。 PCI安全标准委员会要求所有实体都符合PCI数据安全标准(DSS),该标准指定了一系列的安全要求。但是,关于PCI DSS在实践中的执行程度知之甚少。在本文中,我们采用了一种测量方法来系统地评估电子商务网站的PCI DSS认证过程。我们开发了一个电子商务Web应用程序测试台,BuggyCart,该测试可以灵活地添加或删除35个与PCI DSS相关的漏洞。然后,我们使用测试台检查PCI扫描仪的功能和局限性以及认证过程的严格性。我们发现,安全标准与其现实世界执法之间存在着令人震惊的差距。我们测试过的6个PCI扫描仪都不完全符合PCI扫描指南,向仍有主要漏洞的商人颁发证书。为了进一步研究现实世界电子商务网站的合规性状态,我们构建了一个名为Pcicheckerlite的新型轻型扫描工具,并在各个业务领域扫描1,203个电子商务网站。结果证实,有86%的网站至少有一个PCI DSS违规行为,这些违规行为本来应该取消其不合格的资格。我们的深入精度分析还表明,Pcicheckerlite的输出比W3AF更精确。我们与PCI安全理事会联系,分享我们的研究结果,以改善实践中的执法。
The massive payment card industry (PCI) involves various entities such as merchants, issuer banks, acquirer banks, and card brands. Ensuring security for all entities that process payment card information is a challenging task. The PCI Security Standards Council requires all entities to be compliant with the PCI Data Security Standard (DSS), which specifies a series of security requirements. However, little is known regarding how well PCI DSS is enforced in practice. In this paper, we take a measurement approach to systematically evaluate the PCI DSS certification process for e-commerce websites. We develop an e-commerce web application testbed, BuggyCart, which can flexibly add or remove 35 PCI DSS related vulnerabilities. Then we use the testbed to examine the capability and limitations of PCI scanners and the rigor of the certification process. We find that there is an alarming gap between the security standard and its real-world enforcement. None of the 6 PCI scanners we tested are fully compliant with the PCI scanning guidelines, issuing certificates to merchants that still have major vulnerabilities. To further examine the compliance status of real-world e-commerce websites, we build a new lightweight scanning tool named PciCheckerLite and scan 1,203 e-commerce websites across various business sectors. The results confirm that 86% of the websites have at least one PCI DSS violation that should have disqualified them as non-compliant. Our in-depth accuracy analysis also shows that PciCheckerLite's output is more precise than w3af. We reached out to the PCI Security Council to share our research results to improve the enforcement in practice.