Forensic Analysis and Security Assessment in Android m-Banking Applications: A Survey
DOI:
https://doi.org/10.17010/ijcs/2019/v4/i5/149457Keywords:
Android
, Credentials, Digital Population, Malicious Attacks, Malwares, Preserving Data, Private Information, Vulnerabilities.Manuscript Received
, September 3, 2019, Revised, September 15, Accepted, September 18, 2019. Date of Publication, October 5, 2019.Abstract
Data is today's gold. Preserving data is important and it is vital to secure one's private information but nowadays, attackers are stealing users' information and selling it to others for various purposes. In today's world, 57% of digital population is using its smart phones and tablets for all bank related transactions and storing its important credentials. However, majority of people prefer android mobile phones due to its low cost. However, as per recent studies, the Android mobiles are 47% prone to high risk vulnerabilities and 76% of the password credentials can be easily traced. Almost 89% of the vulnerabilities can be exploited through malwares. This survey paper investigates forensic analysis and security assessment in Android mobile banking applications and lists a few measures to safeguard the devices from malicious attacks.Downloads
Downloads
Published
How to Cite
Issue
Section
References
R. Chanajitt, W. Viriyasitavat, and K. K. R. Choo, "Forensic analysis and security assessment of Android m-banking apps," Australian Journal of Forensic Sciences, 50(1), pp. 3-19, 2018. https://dx.doi.org/10.1080/00450618.2016.1182589aa
A. Andrew, O. Oluwafemi, O., I. Idris, and M. A. Shafi'I, "Forensic analysis of mobile banking applications in Nigeria," i-manager's Journal on Mobile Applications and Technologies, 6(1), pp. 9, 2019. https://dx.doi.org/10.26634/jmt.6.1.15704
C. Ntantogian, D. Apostolopoulos, G. Marinakis, and C. Xenakis, "Evaluating the privacy of Android mobile applications under forensic analysis," Computers & Security, 42, pp. 66-76, 2014. https://dx.doi.org/10.1016/j.cose.2014.01.004
X. Lin, T. Chen, T. Zhu, K. Yang, and F. Wei, "Automated forensic analysis of mobile applications on Android devices," Digital Investigation, 26, S59-S66, 2018. https://dx.doi.org/10.1016/j.diin.2018.04.012
T. I. Kitsaki, A. Angelogianni, C. Ntantogian, and C. Xenakis, "A forensic investigation of Android mobile applications," in Proceedings of the 22nd Pan-Hellenic Conference on Informatics, pp. 58-63, 2018.
"Vulnerabilities and threats in mobile applications," [Online]. Available:https://www.ptsecurity.com/ww-en/analytics/mobile-application-security-threats-and-vulnerabilities-2019/