印度用户在使用加密货币交易应用程序时对安全和隐私的看法

Gourav Vakare, Dipanshu Rautela, Hemraj Shobharam Lamkuche
{"title":"印度用户在使用加密货币交易应用程序时对安全和隐私的看法","authors":"Gourav Vakare, Dipanshu Rautela, Hemraj Shobharam Lamkuche","doi":"10.1109/ICKECS56523.2022.10060666","DOIUrl":null,"url":null,"abstract":"Crypto trading has grown at an unprecedented rate since the introduction of crypto trading mobile applications. Wallets, which are mobile applications, are frequently used to facilitate user interaction with cryptocurrencies. Attackers are interested in these wallets because of their perceived real-world value. This article examines the security and privacy profiles of the top six cryptocurrency trading mobile apps in India, focusing on understanding user perceptions of cryptocurrency trading apps and their impact on usability, privacy, and security. Unlike regulated financial services and cryptocurrency applications, wallets are exempt from the same stringent security requirements. The author in this paper can infer that there are just a few mobile-based crypto trading applications from this research of all mobile-based crypto trading applications using different penetration testing techniques. Author check these applications for OWASP-defined common vulnerabilities and discover the connections between various security and privacy concerns as well as how varying threat perceptions affect user security behaviors. The paper also examines how mobile applications may affect user privacy.","PeriodicalId":171432,"journal":{"name":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"User's Perception on Security and Privacy in Using Crypto Currency Trading Application in India\",\"authors\":\"Gourav Vakare, Dipanshu Rautela, Hemraj Shobharam Lamkuche\",\"doi\":\"10.1109/ICKECS56523.2022.10060666\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Crypto trading has grown at an unprecedented rate since the introduction of crypto trading mobile applications. Wallets, which are mobile applications, are frequently used to facilitate user interaction with cryptocurrencies. Attackers are interested in these wallets because of their perceived real-world value. This article examines the security and privacy profiles of the top six cryptocurrency trading mobile apps in India, focusing on understanding user perceptions of cryptocurrency trading apps and their impact on usability, privacy, and security. Unlike regulated financial services and cryptocurrency applications, wallets are exempt from the same stringent security requirements. The author in this paper can infer that there are just a few mobile-based crypto trading applications from this research of all mobile-based crypto trading applications using different penetration testing techniques. Author check these applications for OWASP-defined common vulnerabilities and discover the connections between various security and privacy concerns as well as how varying threat perceptions affect user security behaviors. The paper also examines how mobile applications may affect user privacy.\",\"PeriodicalId\":171432,\"journal\":{\"name\":\"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICKECS56523.2022.10060666\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICKECS56523.2022.10060666","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

自加密交易移动应用程序推出以来,加密交易以前所未有的速度增长。钱包是一种移动应用程序,经常用于促进用户与加密货币的交互。攻击者之所以对这些钱包感兴趣,是因为它们在现实世界中的价值。本文研究了印度前六大加密货币交易移动应用程序的安全和隐私概况,重点了解用户对加密货币交易应用程序的看法及其对可用性、隐私和安全性的影响。与受监管的金融服务和加密货币应用不同,钱包不受同样严格的安全要求的约束。本文作者通过对使用不同渗透测试技术的所有基于移动的加密交易应用程序的研究,可以推断出只有少数基于移动的加密交易应用程序。作者检查了这些应用程序中由owasp定义的常见漏洞,并发现了各种安全和隐私问题之间的联系,以及不同的威胁感知如何影响用户安全行为。论文还研究了移动应用程序如何影响用户隐私。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
User's Perception on Security and Privacy in Using Crypto Currency Trading Application in India
Crypto trading has grown at an unprecedented rate since the introduction of crypto trading mobile applications. Wallets, which are mobile applications, are frequently used to facilitate user interaction with cryptocurrencies. Attackers are interested in these wallets because of their perceived real-world value. This article examines the security and privacy profiles of the top six cryptocurrency trading mobile apps in India, focusing on understanding user perceptions of cryptocurrency trading apps and their impact on usability, privacy, and security. Unlike regulated financial services and cryptocurrency applications, wallets are exempt from the same stringent security requirements. The author in this paper can infer that there are just a few mobile-based crypto trading applications from this research of all mobile-based crypto trading applications using different penetration testing techniques. Author check these applications for OWASP-defined common vulnerabilities and discover the connections between various security and privacy concerns as well as how varying threat perceptions affect user security behaviors. The paper also examines how mobile applications may affect user privacy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信