{"title":"印度用户在使用加密货币交易应用程序时对安全和隐私的看法","authors":"Gourav Vakare, Dipanshu Rautela, Hemraj Shobharam Lamkuche","doi":"10.1109/ICKECS56523.2022.10060666","DOIUrl":null,"url":null,"abstract":"Crypto trading has grown at an unprecedented rate since the introduction of crypto trading mobile applications. Wallets, which are mobile applications, are frequently used to facilitate user interaction with cryptocurrencies. Attackers are interested in these wallets because of their perceived real-world value. This article examines the security and privacy profiles of the top six cryptocurrency trading mobile apps in India, focusing on understanding user perceptions of cryptocurrency trading apps and their impact on usability, privacy, and security. Unlike regulated financial services and cryptocurrency applications, wallets are exempt from the same stringent security requirements. The author in this paper can infer that there are just a few mobile-based crypto trading applications from this research of all mobile-based crypto trading applications using different penetration testing techniques. Author check these applications for OWASP-defined common vulnerabilities and discover the connections between various security and privacy concerns as well as how varying threat perceptions affect user security behaviors. The paper also examines how mobile applications may affect user privacy.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"User's Perception on Security and Privacy in Using Crypto Currency Trading Application in India\",\"authors\":\"Gourav Vakare, Dipanshu Rautela, Hemraj Shobharam Lamkuche\",\"doi\":\"10.1109/ICKECS56523.2022.10060666\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Crypto trading has grown at an unprecedented rate since the introduction of crypto trading mobile applications. Wallets, which are mobile applications, are frequently used to facilitate user interaction with cryptocurrencies. Attackers are interested in these wallets because of their perceived real-world value. This article examines the security and privacy profiles of the top six cryptocurrency trading mobile apps in India, focusing on understanding user perceptions of cryptocurrency trading apps and their impact on usability, privacy, and security. Unlike regulated financial services and cryptocurrency applications, wallets are exempt from the same stringent security requirements. The author in this paper can infer that there are just a few mobile-based crypto trading applications from this research of all mobile-based crypto trading applications using different penetration testing techniques. Author check these applications for OWASP-defined common vulnerabilities and discover the connections between various security and privacy concerns as well as how varying threat perceptions affect user security behaviors. The paper also examines how mobile applications may affect user privacy.\",\"PeriodicalId\":171432,\"journal\":{\"name\":\"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICKECS56523.2022.10060666\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICKECS56523.2022.10060666","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
User's Perception on Security and Privacy in Using Crypto Currency Trading Application in India
Crypto trading has grown at an unprecedented rate since the introduction of crypto trading mobile applications. Wallets, which are mobile applications, are frequently used to facilitate user interaction with cryptocurrencies. Attackers are interested in these wallets because of their perceived real-world value. This article examines the security and privacy profiles of the top six cryptocurrency trading mobile apps in India, focusing on understanding user perceptions of cryptocurrency trading apps and their impact on usability, privacy, and security. Unlike regulated financial services and cryptocurrency applications, wallets are exempt from the same stringent security requirements. The author in this paper can infer that there are just a few mobile-based crypto trading applications from this research of all mobile-based crypto trading applications using different penetration testing techniques. Author check these applications for OWASP-defined common vulnerabilities and discover the connections between various security and privacy concerns as well as how varying threat perceptions affect user security behaviors. The paper also examines how mobile applications may affect user privacy.