Detailed Information

Cited 5 time in webofscience Cited 5 time in scopus
Metadata Downloads

Personal Information Leaks with Automatic Login in Mobile Social Network Services

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Jongwon-
dc.contributor.authorCHO, HAEHYUN-
dc.contributor.authorYi, Jeong Hyun-
dc.date.available2018-05-09T07:35:14Z-
dc.date.created2018-04-17-
dc.date.issued2015-06-
dc.identifier.issn1099-4300-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/8726-
dc.description.abstractTo log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on the server based on the user's ID and password. This security token is called a credential. Because such credentials are convenient for users, they are utilized by most mobile SNS apps. However, the current state of credential management for the majority of Android SNS apps is very weak. This paper demonstrates the possibility of a credential cloning attack. Such attacks occur when an attacker extracts the credential from the victim's smart device and inserts it into their own smart device. Then, without knowing the victim's ID and password, the attacker can access the victim's account. This type of attack gives access to various pieces of personal information without authorization. Thus, in this paper, we analyze the vulnerabilities of the main Android-based SNS apps to credential cloning attacks, and examine the potential leakage of personal information that may result. We then introduce effective countermeasures to resolve these problems.-
dc.language영어-
dc.language.isoen-
dc.publisherMDPI AG-
dc.relation.isPartOfENTROPY-
dc.titlePersonal Information Leaks with Automatic Login in Mobile Social Network Services-
dc.typeArticle-
dc.identifier.doi10.3390/e17063947-
dc.type.rimsART-
dc.identifier.bibliographicCitationENTROPY, v.17, no.6, pp.3947 - 3962-
dc.description.journalClass1-
dc.identifier.wosid000357803000023-
dc.identifier.scopusid2-s2.0-84934325878-
dc.citation.endPage3962-
dc.citation.number6-
dc.citation.startPage3947-
dc.citation.titleENTROPY-
dc.citation.volume17-
dc.contributor.affiliatedAuthorCHO, HAEHYUN-
dc.contributor.affiliatedAuthorYi, Jeong Hyun-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.oadoiVersionpublished-
dc.subject.keywordAuthorcredential-
dc.subject.keywordAuthorAndroid vulnerability-
dc.subject.keywordAuthorauthentication-
dc.subject.keywordAuthorpersonal information leakage-
dc.subject.keywordPlusCOUNTERMEASURES-
dc.subject.keywordPlusSECURITY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
Go to Link
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHO, HAEHYUN photo

CHO, HAEHYUN
College of Information Technology (School of Software)
Read more

Altmetrics

Total Views & Downloads

BROWSE