Forensic Analysis and Security Assessment in Android m-Banking Applications: A Survey

Authors

  •   K. Khavya Post Graduate student, Department of Information Technology, PSG College of Technology, Coimbatore - 641 004, Tamil Nadu
  •   N. Hema Priya Assistant Professor, Department of Information Technology, PSG College of Technology, Coimbatore - 641 004, Tamil Nadu

DOI:

https://doi.org/10.17010/ijcs/2019/v4/i5/149457

Keywords:

Android

, Credentials, Digital Population, Malicious Attacks, Malwares, Preserving Data, Private Information, Vulnerabilities.

Manuscript Received

, September 3, 2019, Revised, September 15, Accepted, September 18, 2019. Date of Publication, October 5, 2019.

Abstract

Data is today's gold. Preserving data is important and it is vital to secure one's private information but nowadays, attackers are stealing users' information and selling it to others for various purposes. In today's world, 57% of digital population is using its smart phones and tablets for all bank related transactions and storing its important credentials. However, majority of people prefer android mobile phones due to its low cost. However, as per recent studies, the Android mobiles are 47% prone to high risk vulnerabilities and 76% of the password credentials can be easily traced. Almost 89% of the vulnerabilities can be exploited through malwares. This survey paper investigates forensic analysis and security assessment in Android mobile banking applications and lists a few measures to safeguard the devices from malicious attacks.

Downloads

Download data is not yet available.

Downloads

Published

2019-10-31

How to Cite

Khavya, K., & Hema Priya, N. (2019). Forensic Analysis and Security Assessment in Android m-Banking Applications: A Survey. Indian Journal of Computer Science, 4(5), 25–28. https://doi.org/10.17010/ijcs/2019/v4/i5/149457

References

R. Chanajitt, W. Viriyasitavat, and K. K. R. Choo, "Forensic analysis and security assessment of Android m-banking apps," Australian Journal of Forensic Sciences, 50(1), pp. 3-19, 2018. https://dx.doi.org/10.1080/00450618.2016.1182589aa

A. Andrew, O. Oluwafemi, O., I. Idris, and M. A. Shafi'I, "Forensic analysis of mobile banking applications in Nigeria," i-manager's Journal on Mobile Applications and Technologies, 6(1), pp. 9, 2019. https://dx.doi.org/10.26634/jmt.6.1.15704

C. Ntantogian, D. Apostolopoulos, G. Marinakis, and C. Xenakis, "Evaluating the privacy of Android mobile applications under forensic analysis," Computers & Security, 42, pp. 66-76, 2014. https://dx.doi.org/10.1016/j.cose.2014.01.004

X. Lin, T. Chen, T. Zhu, K. Yang, and F. Wei, "Automated forensic analysis of mobile applications on Android devices," Digital Investigation, 26, S59-S66, 2018. https://dx.doi.org/10.1016/j.diin.2018.04.012

T. I. Kitsaki, A. Angelogianni, C. Ntantogian, and C. Xenakis, "A forensic investigation of Android mobile applications," in Proceedings of the 22nd Pan-Hellenic Conference on Informatics, pp. 58-63, 2018.

"Vulnerabilities and threats in mobile applications," [Online]. Available:https://www.ptsecurity.com/ww-en/analytics/mobile-application-security-threats-and-vulnerabilities-2019/