Repackaging Attack on Android Banking Applications and Its Countermeasures

  • Authors:
  • Jin-Hyuk Jung;Ju Young Kim;Hyeong-Chan Lee;Jeong Hyun Yi

  • Affiliations:
  • School of Computer Science and Engineering, Soongsil University, Seoul, Korea;School of Computer Science and Engineering, Soongsil University, Seoul, Korea;School of Computer Science and Engineering, Soongsil University, Seoul, Korea;School of Computer Science and Engineering, Soongsil University, Seoul, Korea

  • Venue:
  • Wireless Personal Communications: An International Journal
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Although anyone can easily publish Android applications (or apps) in an app marketplace according to an open policy, decompiling the apps is also easy due to the structural characteristics of the app building process, making them very vulnerable to forgery or modification attacks. In particular, users may suffer direct financial loss if this vulnerability is exploited in security-critical private and business applications, such as online banking. In this paper, some of the major Android-based smartphone banking apps in Korea being distributed on either the Android Market or the third party market were tested to verify whether a money transfer could be made to an unintended recipient. The experimental results with real Android banking apps showed that an attack of this kind is possible without having to illegally obtain any of the sender's personal information, such as the senders public key certificate, the password to their bank account, or their security card. In addition, the cause of this vulnerability is analyzed and some technical countermeasures are discussed.