让我们谈谈金钱:评估发展中国家移动货币的安全挑战

Sam Castle, Fahad Pervaiz, Galen Cassebeer Weld, Franziska Roesner, Richard J. Anderson
{"title":"让我们谈谈金钱:评估发展中国家移动货币的安全挑战","authors":"Sam Castle, Fahad Pervaiz, Galen Cassebeer Weld, Franziska Roesner, Richard J. Anderson","doi":"10.1145/3001913.3001919","DOIUrl":null,"url":null,"abstract":"Digital money drives modern economies, and the global adoption of mobile phones has enabled a wide range of digital financial services in the developing world. Where there is money, there must be security, yet prior work on mobile money has identified discouraging vulnerabilities in the current ecosystem. We begin by arguing that the situation is not as dire as it may seem---many reported issues can be resolved by security best practices and updated mobile software. To support this argument, we diagnose the problems from two directions: (1) a large-scale analysis of existing financial service products and (2) a series of interviews with 7 developers and designers in Africa and South America. We frame this assessment within a novel, systematic threat model. In our large-scale analysis, we evaluate 197 Android apps and take a deeper look at 71 products to assess specific organizational practices. We conclude that although attack vectors are present in many apps, service providers are generally making intentional, security-conscious decisions. The developer interviews support these findings, as most participants demonstrated technical competency and experience, and all worked within established organizations with regimented code review processes and dedicated security teams.","PeriodicalId":204042,"journal":{"name":"Proceedings of the 7th Annual Symposium on Computing for Development","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":"{\"title\":\"Let's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World\",\"authors\":\"Sam Castle, Fahad Pervaiz, Galen Cassebeer Weld, Franziska Roesner, Richard J. Anderson\",\"doi\":\"10.1145/3001913.3001919\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital money drives modern economies, and the global adoption of mobile phones has enabled a wide range of digital financial services in the developing world. Where there is money, there must be security, yet prior work on mobile money has identified discouraging vulnerabilities in the current ecosystem. We begin by arguing that the situation is not as dire as it may seem---many reported issues can be resolved by security best practices and updated mobile software. To support this argument, we diagnose the problems from two directions: (1) a large-scale analysis of existing financial service products and (2) a series of interviews with 7 developers and designers in Africa and South America. We frame this assessment within a novel, systematic threat model. In our large-scale analysis, we evaluate 197 Android apps and take a deeper look at 71 products to assess specific organizational practices. We conclude that although attack vectors are present in many apps, service providers are generally making intentional, security-conscious decisions. The developer interviews support these findings, as most participants demonstrated technical competency and experience, and all worked within established organizations with regimented code review processes and dedicated security teams.\",\"PeriodicalId\":204042,\"journal\":{\"name\":\"Proceedings of the 7th Annual Symposium on Computing for Development\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-11-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"37\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 7th Annual Symposium on Computing for Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3001913.3001919\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th Annual Symposium on Computing for Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3001913.3001919","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 37

摘要

数字货币推动着现代经济,移动电话的全球普及使发展中国家能够提供广泛的数字金融服务。哪里有钱,哪里就必须有安全,然而之前关于移动货币的工作已经发现了当前生态系统中令人沮丧的漏洞。我们首先认为,情况并不像看起来那么可怕——许多报告的问题可以通过安全最佳实践和更新的移动软件来解决。为了支持这一论点,我们从两个方向诊断了问题:(1)对现有金融服务产品的大规模分析;(2)对非洲和南美的7名开发者和设计师进行了一系列访谈。我们在一个新颖的、系统的威胁模型中构建了这个评估。在我们的大规模分析中,我们评估了197个Android应用程序,并对71个产品进行了更深入的研究,以评估具体的组织实践。我们得出的结论是,尽管攻击媒介存在于许多应用程序中,但服务提供商通常会有意识地做出安全决策。开发人员访谈支持这些发现,因为大多数参与者展示了技术能力和经验,并且所有人都在具有规范的代码审查过程和专门的安全团队的已建立的组织中工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Let's Talk Money: Evaluating the Security Challenges of Mobile Money in the Developing World
Digital money drives modern economies, and the global adoption of mobile phones has enabled a wide range of digital financial services in the developing world. Where there is money, there must be security, yet prior work on mobile money has identified discouraging vulnerabilities in the current ecosystem. We begin by arguing that the situation is not as dire as it may seem---many reported issues can be resolved by security best practices and updated mobile software. To support this argument, we diagnose the problems from two directions: (1) a large-scale analysis of existing financial service products and (2) a series of interviews with 7 developers and designers in Africa and South America. We frame this assessment within a novel, systematic threat model. In our large-scale analysis, we evaluate 197 Android apps and take a deeper look at 71 products to assess specific organizational practices. We conclude that although attack vectors are present in many apps, service providers are generally making intentional, security-conscious decisions. The developer interviews support these findings, as most participants demonstrated technical competency and experience, and all worked within established organizations with regimented code review processes and dedicated security teams.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信