Analysing data security requirements of Android mobile banking application

dc.contributor.authorBhatnagar, Shikhar
dc.date.accessioned2025-05-01T16:10:33Z
dc.date.available2025-05-01T16:10:33Z
dc.date.issued2018
dc.descriptionMobile banking applications are at high risk of cyber attacks due to security vulnerabilities in their underlying operating systems. Android is the most popular operating system with feature like openness and customization. The Inter-Process Communication mechanism in Android enables applications to communicate, share data and reuse functionality between them. However, if used incorrectly, it can become attack surface, which allows malicious applications to exploit devices and compromise sensitive financial information. In this research, fuzzing approach is studied to analyse the data security requirement of Android mobile banking application during the inter process communication. Firstly, experimental setup automatically constructs application behaviour, after that generative fuzzing is applied to the information collected during behaviour analysis to analyse the data leak vulnerabilities. Experimental analysis and results shows the easily exploitable entry points in the applications under test.
dc.identifier.doihttps://doi.org/10.7939/r3-sg8c-zc92
dc.language.isoen
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/
dc.subjectgenerative fuzzing
dc.subjectmutation fuzzing
dc.subjectsecurity testing
dc.subjectfuzzing
dc.subjectdata leaks
dc.titleAnalysing data security requirements of Android mobile banking application
dc.typehttp://purl.org/coar/resource_type/c_1843
ual.jupiterAccesshttp://terms.library.ualberta.ca/public

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Bhatnagar_2018_Spring_MISSM.pdf
Size:
874.76 KB
Format:
Adobe Portable Document Format