{"title":"Security Threats to the Platform Identification","authors":"Kyungroul Lee, Hyeungjun Yeuk, Habin Lim, Kangbin Yim","doi":"10.1109/BWCCA.2015.102","DOIUrl":null,"url":null,"abstract":"In this paper, we analyze security threats against the services that limits allowance only to the registered platforms for their users, of which core technology is called designated platform solution and it has been deployed in several critical services such as on-line banking, financial transactions and so on. In this paper, we classify potential security threats against this solution into four different areas, process, network layer, software module, and terminal environment. Then, we analyze the security threats by deriving the practical vulnerabilities in each area. The results from this work will be helpful for defining new criteria to improve the security level of the services based on the designated platform solution.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2015.102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, we analyze security threats against the services that limits allowance only to the registered platforms for their users, of which core technology is called designated platform solution and it has been deployed in several critical services such as on-line banking, financial transactions and so on. In this paper, we classify potential security threats against this solution into four different areas, process, network layer, software module, and terminal environment. Then, we analyze the security threats by deriving the practical vulnerabilities in each area. The results from this work will be helpful for defining new criteria to improve the security level of the services based on the designated platform solution.