On App-based Matrix Code Authentication in Online Banking

被引:5
作者
Haupert, Vincent [1 ]
Mueller, Tilo [1 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Dept Comp Sci, Erlangen, Germany
来源
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2018年
关键词
Mobile Banking; App-based Authentication; Malware; PSD2; Compliance;
D O I
10.5220/0006650501490160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to their growing popularity, smartphones have made two-step authentication schemes not only accessible to everybody but also inexpensive for both the provider and the end user. Although app-based two-factor methods provide an additional element of authentication, they pose a risk if they are used as a replacement for an authentication system that is already secured by two-factor authentication. This particularly affects digital banking. Unlike methods backed by dedicated hardware to securely legitimize transactions, authentication apps run on multi-purpose devices such as smartphones and tablets, and are thus exposed to the threat of malware. This vulnerability becomes particularly damaging if the online banking app and the authentication app are both running on the same device. In order to emphasize the risks that single-device mobile banking poses, we show a transaction manipulation attack on the app-based authentication schemes of Deutsche Bank, Commerzbank, and Norisbank. Furthermore, we evaluate whether the matrix code authentication method that these banks and Comdirect implement-widely known as photoTAN-is compliant with the upcoming Revised Payment Service Directive (PSD2) of the European Banking Authority (EBA).
引用
收藏
页码:149 / 160
页数:12
相关论文
共 29 条
[11]  
Donenfeld A, 2016, QUADROOTER NEW ANDRO
[12]  
European Banking Authority, 2016, EBA CONS STRONG CUST EBA CONS STRONG CUST
[13]  
European Maritime Safety Agency, 2017, BROCH
[14]  
Goodin D., 2016, 10 million android phones infected by all-powerful auto-rooting apps
[15]  
Goodin D., 2016, ANDROID PHONES ROOTE
[16]  
Haupert V., 2016, SICHERHEIT 2016 SICH
[17]  
ING, 2016, ING INT SURVEY MOBIL
[18]  
Kivva A, 2016, BANKER CAN STEAL ANY
[19]   How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication [J].
Konoth, Radhesh Krishnan ;
van der Veen, Victor ;
Bos, Herbert .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 :405-421
[20]   Divide-and-Conquer: Why Android Malware cannot be stopped [J].
Maier, Dominik ;
Mueller, Tilo ;
Protsenko, Mykola .
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, :30-39