Detailed Information

Cited 40 time in webofscience Cited 56 time in scopus
Metadata Downloads

Repackaging Attack on Android Banking Applications and Its Countermeasures

Full metadata record
DC Field Value Language
dc.contributor.authorJung, Jin-Hyuk-
dc.contributor.authorKim, Ju Young-
dc.contributor.authorLee, Hyeong-Chan-
dc.contributor.authorYi, Jeong Hyun-
dc.date.available2018-05-09T13:54:20Z-
dc.date.created2018-04-17-
dc.date.issued2013-12-
dc.identifier.issn0929-6212-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/11099-
dc.description.abstractAlthough anyone can easily publish Android applications (or apps) in an app marketplace according to an open policy, decompiling the apps is also easy due to the structural characteristics of the app building process, making them very vulnerable to forgery or modification attacks. In particular, users may suffer direct financial loss if this vulnerability is exploited in security-critical private and business applications, such as online banking. In this paper, some of the major Android-based smartphone banking apps in Korea being distributed on either the Android Market or the third party market were tested to verify whether a money transfer could be made to an unintended recipient. The experimental results with real Android banking apps showed that an attack of this kind is possible without having to illegally obtain any of the sender's personal information, such as the senders public key certificate, the password to their bank account, or their security card. In addition, the cause of this vulnerability is analyzed and some technical countermeasures are discussed.-
dc.publisherSPRINGER-
dc.relation.isPartOfWIRELESS PERSONAL COMMUNICATIONS-
dc.titleRepackaging Attack on Android Banking Applications and Its Countermeasures-
dc.typeArticle-
dc.identifier.doi10.1007/s11277-013-1258-x-
dc.type.rimsART-
dc.identifier.bibliographicCitationWIRELESS PERSONAL COMMUNICATIONS, v.73, no.4, pp.1421 - 1437-
dc.description.journalClass1-
dc.identifier.wosid000327883300006-
dc.identifier.scopusid2-s2.0-84890552399-
dc.citation.endPage1437-
dc.citation.number4-
dc.citation.startPage1421-
dc.citation.titleWIRELESS PERSONAL COMMUNICATIONS-
dc.citation.volume73-
dc.contributor.affiliatedAuthorYi, Jeong Hyun-
dc.type.docTypeArticle-
dc.description.oadoiVersionpublished-
dc.subject.keywordAuthorSmartphone application vulnerability-
dc.subject.keywordAuthorAndroid app repackaging-
dc.subject.keywordAuthorReverse engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
Go to Link
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher YI, JEONG HYUN photo

YI, JEONG HYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE