Security model on mobile banking application: attack simulation and countermeasures
Yacouba Kouraogo,
Karim Zkik,
Noreddine El Janati El Idrissi and
Ghizlane Orhanou
International Journal of Intelligent Enterprise, 2017, vol. 4, issue 1/2, 155-167
Abstract:
Nowadays, we use mobile devices in all activities such as communication, play, surf on the internet, shop online and banking transactions. But the applications used do not always comply with the security requirements on mobile environment and this can cause vulnerabilities allowing attackers to take control of the phone and to steal some users' private data. That is why, it is important to take a look at the security of mobile applications especially of financial institutions. In this paper, we will present some security issues of android applications. We will also make a reverse engineering of an Android banking application, then a static analysis of its code to detect its weaknesses. After that, we will insert a malicious code that will help us not only to take control of the smartphone but also to make a DDOS attack on a simulated bank server. Finally, we will propose some countermeasures.
Keywords: mobile malware; reverse engineering; static analysis; DDOS attack. (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=87014 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijient:v:4:y:2017:i:1/2:p:155-167
Access Statistics for this article
More articles in International Journal of Intelligent Enterprise from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().