关于android设备移动银行应用的MitM漏洞

S. Kaka, V. N. Sastry, R. Maiti
{"title":"关于android设备移动银行应用的MitM漏洞","authors":"S. Kaka, V. N. Sastry, R. Maiti","doi":"10.1109/ANTS.2016.7947811","DOIUrl":null,"url":null,"abstract":"One of the primary concerns that the developers of mobile banking applications should strive to is to ensure the security of user information originating from any of these applications. However, implementing even basic security features, like performing encryption on user data or using HTTPS while connection establishment, on such mobile applications, is often found to be absent either due to the lack of knowledge of user security concerns, or unavailability of security testing experts who can point out the security flaws in the applications. In this paper, we consider man-in-the-middle (MitM) attack, a simple yet powerful attack, as a primary attack to test basic security features that a mobile banking application should impose. We have considered a total of 19 mobile banking applications on Android that are currently got deployed by public sector banks in India and are used by their respective customers. Surprisingly, the In about 90% of these banking applications, we have observed that the attack can be launched with ease even if the applications are using security protocols like HTTPS to establish a communication channel with their respective servers. Moreover, some mobile applications are using simple HTTP protocol to transfer user information without bothering anything about security. Hence, our analysis suggests that a level of revision is required to address the basic security flaws in the mobile banking applications to prevent even simple MitM attack.","PeriodicalId":248902,"journal":{"name":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"4 8","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"On the MitM vulnerability in mobile banking applications for android devices\",\"authors\":\"S. Kaka, V. N. Sastry, R. Maiti\",\"doi\":\"10.1109/ANTS.2016.7947811\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the primary concerns that the developers of mobile banking applications should strive to is to ensure the security of user information originating from any of these applications. However, implementing even basic security features, like performing encryption on user data or using HTTPS while connection establishment, on such mobile applications, is often found to be absent either due to the lack of knowledge of user security concerns, or unavailability of security testing experts who can point out the security flaws in the applications. In this paper, we consider man-in-the-middle (MitM) attack, a simple yet powerful attack, as a primary attack to test basic security features that a mobile banking application should impose. We have considered a total of 19 mobile banking applications on Android that are currently got deployed by public sector banks in India and are used by their respective customers. Surprisingly, the In about 90% of these banking applications, we have observed that the attack can be launched with ease even if the applications are using security protocols like HTTPS to establish a communication channel with their respective servers. Moreover, some mobile applications are using simple HTTP protocol to transfer user information without bothering anything about security. Hence, our analysis suggests that a level of revision is required to address the basic security flaws in the mobile banking applications to prevent even simple MitM attack.\",\"PeriodicalId\":248902,\"journal\":{\"name\":\"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"volume\":\"4 8\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ANTS.2016.7947811\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2016.7947811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

手机银行应用程序的开发人员应该努力确保来自这些应用程序的用户信息的安全性。然而,即使是基本的安全功能,如对用户数据进行加密或在连接建立时使用HTTPS,在这样的移动应用程序上,由于缺乏对用户安全问题的了解,或者缺乏可以指出应用程序安全缺陷的安全测试专家,也经常被发现是不存在的。在本文中,我们考虑中间人(MitM)攻击,一种简单而强大的攻击,作为测试移动银行应用程序应该施加的基本安全功能的主要攻击。我们考虑了总共19个Android手机银行应用程序,这些应用程序目前由印度的公共部门银行部署,并由各自的客户使用。令人惊讶的是,在大约90%的这些银行应用程序中,我们已经观察到,即使应用程序使用HTTPS等安全协议与各自的服务器建立通信通道,也可以轻松启动攻击。此外,一些移动应用程序使用简单的HTTP协议来传输用户信息,而不担心任何安全问题。因此,我们的分析表明,需要一定程度的修订来解决移动银行应用程序中的基本安全漏洞,以防止甚至简单的MitM攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On the MitM vulnerability in mobile banking applications for android devices
One of the primary concerns that the developers of mobile banking applications should strive to is to ensure the security of user information originating from any of these applications. However, implementing even basic security features, like performing encryption on user data or using HTTPS while connection establishment, on such mobile applications, is often found to be absent either due to the lack of knowledge of user security concerns, or unavailability of security testing experts who can point out the security flaws in the applications. In this paper, we consider man-in-the-middle (MitM) attack, a simple yet powerful attack, as a primary attack to test basic security features that a mobile banking application should impose. We have considered a total of 19 mobile banking applications on Android that are currently got deployed by public sector banks in India and are used by their respective customers. Surprisingly, the In about 90% of these banking applications, we have observed that the attack can be launched with ease even if the applications are using security protocols like HTTPS to establish a communication channel with their respective servers. Moreover, some mobile applications are using simple HTTP protocol to transfer user information without bothering anything about security. Hence, our analysis suggests that a level of revision is required to address the basic security flaws in the mobile banking applications to prevent even simple MitM attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信