{"title":"Vulnerability Exploiting SMS Push Notifications","authors":"Rina Shibayama, Hiroaki Kikuchi","doi":"10.1109/AsiaJCIS53848.2021.00014","DOIUrl":null,"url":null,"abstract":"SMS (Short Message Service)-based authentication is widely used as a simple and secure multi-factor authentication, where OTP (One Time Password) is sent to user’s mobile phone via SMS. However, SMS authentication is vulnerable to Password Reset Man in the Middle Attack (PRMitM). In this attack, the attacker makes a victim perform password reset OTP for sign-up verification OTP. If the victim enters OTP to a malicious man-in-the-middle site, the attacker can overtake the victim’s account.We find new smartphone useful functions may increase PR-MitM attack risks. SMS push notification informs us an arrival of message by showing only beginning of the message. Hence, those who received SMS OTP do not notice the cautionary notes and the name of the sender that are supposed to show below the code, which may lead to be compromised. Auto-fill function, which allow us to input authentication code with one touch, is also vulnerable for the same reason.In this study, we conduct a user study to investigate the effect of new smartphone functions incurring PRMitM attack.","PeriodicalId":134911,"journal":{"name":"2021 16th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"13 7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 16th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS53848.2021.00014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
SMS (Short Message Service)-based authentication is widely used as a simple and secure multi-factor authentication, where OTP (One Time Password) is sent to user’s mobile phone via SMS. However, SMS authentication is vulnerable to Password Reset Man in the Middle Attack (PRMitM). In this attack, the attacker makes a victim perform password reset OTP for sign-up verification OTP. If the victim enters OTP to a malicious man-in-the-middle site, the attacker can overtake the victim’s account.We find new smartphone useful functions may increase PR-MitM attack risks. SMS push notification informs us an arrival of message by showing only beginning of the message. Hence, those who received SMS OTP do not notice the cautionary notes and the name of the sender that are supposed to show below the code, which may lead to be compromised. Auto-fill function, which allow us to input authentication code with one touch, is also vulnerable for the same reason.In this study, we conduct a user study to investigate the effect of new smartphone functions incurring PRMitM attack.
基于SMS (Short Message Service)的身份验证是一种简单、安全的多因素身份验证方法,它将一次性密码(OTP)通过短信发送到用户的手机上。但是,短信认证容易受到PRMitM (Password Reset Man in the Middle Attack)攻击。在此攻击中,攻击者让受害者执行密码重置OTP以进行注册验证OTP。如果受害者将OTP输入到恶意中间人站点,攻击者可以接管受害者的帐户。我们发现新的智能手机有用功能可能会增加PR-MitM攻击的风险。SMS推送通知通过只显示消息的开头来通知我们消息的到达。因此,那些收到短信OTP的人不会注意到代码下面应该显示的警告说明和发件人的姓名,这可能会导致受到损害。由于同样的原因,允许我们一次触摸输入身份验证代码的自动填充功能也很容易受到攻击。在这项研究中,我们进行了一项用户研究,以调查智能手机新功能引发PRMitM攻击的影响。