Skip to main content

Security of Mobile Banking Applications

  • Conference paper
  • First Online:
Book cover Advanced Solutions in Diagnostics and Fault Tolerant Control (DPS 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 635))

Included in the following conference series:

Abstract

In this paper authors presents report about current Android applications security. OWASP’s top 10 mobile security risks was used, to verify level of security. Authors also design concept tool which will detect potential risks in code of Android application after reverse engineering of it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Posegga, J., Schreckling, D.: Next generation mobile application security. In: IT-Sicherheit zwischen Regulierung und Innovation: Tagungsband zur zweiten EICT-Konferenz IT-Sicherheit, pp. 181–199 (2011)

    Google Scholar 

  2. Tin, Y.S.T., Vasanta, H., Boyd, C., Nieto, J.M.G.: Protocols with security proofs for mobile applications. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) Information Security and Privacy. ACISP 2004. Lecture Notes in Computer Science, vol. 3108. Springer, Heidelberg (2004)

    Google Scholar 

  3. Zhang, X., Yang, F., Liu, Z., Wang, Z., Wang, K.: Research and application of data security for mobile devices. In: Li, D., Liu, Y., Chen, Y. (eds.) Computer and Computing Technologies in Agriculture IV. CCTA 2010. IFIP Advances in Information and Communication Technology, vol. 346. Springer, Heidelberg (2011)

    Google Scholar 

  4. Cimler, R., Matyska, J., Balk, L., Horalek, J., Sobeslav, V.: Security issues of mobile application using cloud computing. In: Abraham, A., Krömer, P., Snasel, V. (eds.) Afro-European Conference for Industrial Advancement. Advances in Intelligent Systems and Computing, vol. 334. Springer, Cham (2015)

    Google Scholar 

  5. 2016 Mobile Security Report, https://info.nowsecure.com/2016-mobile-security-report.html, Accessed 10 Mar 2017

  6. Gartner Magic Quadrant for Application Security Testing (2017). https://info.veracode.com/analyst-report-gartner-mq-appsec-testing-2017.html, Accessed 10 Mar 2017

  7. The State of Mobile Web in the US (2015), https://www.similarweb.com/corp/the-state-of-mobile-web-in-the-us-2015/, Accessed 10 Mar 2017

  8. OWASP, https://www.owasp.org, Accessed 10 Mar 2017

  9. Drozer, https://labs.mwrinfosecurity.com, Accessed 10 Mar 2017

  10. Ostorlab, https://www.ostorlab.co, Accessed 10 Mar 2017

  11. Appvigil, https://www.appvigil.co, Accessed 10 Mar 2017

  12. Quixxi, https://www.quixxi.com, Accessed 10 Mar 2017

  13. AndroTotal, http://andrototal.org, Accessed 10 Mar 2017

  14. MobiSecLab Acana, http://www.mobiseclab.org/akana/Intro.html, Accessed 05 Mar 2017

  15. Veracode, https://www.veracode.com/, Accessed 05 Mar 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ireneusz Jóźwiak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Szczepanik, M., Jóźwiak, I. (2018). Security of Mobile Banking Applications . In: Kościelny, J., Syfert, M., Sztyber, A. (eds) Advanced Solutions in Diagnostics and Fault Tolerant Control. DPS 2017. Advances in Intelligent Systems and Computing, vol 635. Springer, Cham. https://doi.org/10.1007/978-3-319-64474-5_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64474-5_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64473-8

  • Online ISBN: 978-3-319-64474-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics