Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3377811.3380417acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

An empirical assessment of security risks of global Android banking apps

Published: 01 October 2020 Publication History

Abstract

Mobile banking apps, belonging to the most security-critical app category, render massive and dynamic transactions susceptible to security risks. Given huge potential financial loss caused by vulnerabilities, existing research lacks a comprehensive empirical study on the security risks of global banking apps to provide useful insights and improve the security of banking apps.
Since data-related weaknesses in banking apps are critical and may directly cause serious financial loss, this paper first revisits the state-of-the-art available tools and finds that they have limited capability in identifying data-related security weaknesses of banking apps. To complement the capability of existing tools in data-related weakness detection, we propose a three-phase automated security risk assessment system, named Ausera, which leverages static program analysis techniques and sensitive keyword identification. By leveraging Ausera, we collect 2,157 weaknesses in 693 real-world banking apps across 83 countries, which we use as a basis to conduct a comprehensive empirical study from different aspects, such as global distribution and weakness evolution during version updates. We find that apps owned by subsidiary banks are always less secure than or equivalent to those owned by parent banks. In addition, we also track the patching of weaknesses and receive much positive feedback from banking entities so as to improve the security of banking apps in practice. We further find that weaknesses derived from outdated versions of banking apps or third-party libraries are highly prone to being exploited by attackers. To date, we highlight that 21 banks have confirmed the weaknesses we reported (including 126 weaknesses in total). We also exchange insights with 7 banks, such as HSBC in UK and OCBC in Singapore, via in-person or online meetings to help them improve their apps. We hope that the insights developed in this paper will inform the communities about the gaps among multiple stakeholders, including banks, academic researchers, and third-party security companies.

References

[1]
2007. Kenya sets world first with money transfers by mobile. https://www.theguardian.com/money/2007/mar/20/kenya.mobilephones. (2007).
[2]
2015. AndroBugs. https://github.com/AndroBugs/. (2015).
[3]
2015. Over $7,000 lost in malware attack at fake banking portal. http://www.straitstimes.com/singapore/over-7000-lost-in-malware-attack-at-fake-banking-portal/. (2015).
[4]
2017. Android vulnerability allows attackers to modify apps without affecting their signatures. https://www.helpnetsecurity.com/2017/12/11/android-modify-apps-without-afecting-signatures/. (2017).
[5]
2017. Apktool: A tool for reverse engineering Android apk files. https://ibotpeaches.github.io/Apktool/. (2017).
[6]
2017. Burp Suite. https://portswigger.net/burp. (2017).
[7]
2017. Data Dispatch: The world's 100 largest banks. http://www.snl.com/web/client?auth=inherit#news/article?id=40223698&cdid=A-40223698-11568. (2017).
[8]
2017. Fiddler: Free Web Debugging Proxy - Telerik. http://www.telerik.com/fiddler. (2017).
[9]
2017. Flaw discovered in banking apps leaving millions vulnerable to hack. http://www.telegraph.co.uk/science/2017/12/06/flaw-discovered-banking-apps-leaving-millions-vulnerable-hack/. (2017).
[10]
2017. Google Best Practices for Security & Privacy. https://developer.android.com/training/best-security.html. (2 2017).
[11]
2017. Hackers' Delight: Mobile bank app security flaw could have smacked millions. https://www.theregister.co.uk/2017/12/11/mobile_banking_security_research/. (2017).
[12]
2017. Kenya tops Africa in use of mobile financial services. http://kenyanwallstreet.com/kenya-tops-africa-use-mobile-financial-services-report. (2017).
[13]
2017. Mobile-Security-Framework-MobSF. https://github.com/MobSF/Mobile-Security-Framework-MobSF. (2017).
[14]
2017. OWASP: OWASP Mobile Security Project. https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10. (2 2017).
[15]
2017. PCI: Security Standards Council. https://www.pcisecuritystandards.org/. (2017).
[16]
2017. QARK: Tool to look for several security related Android application vulnerabilities. https://github.com/linkedin/qark. (2017).
[17]
2017. Qihoo360 (Appscan). http://appscan.360.cn/. (2017).
[18]
2017. The EU General Data Protection Regulation. https://www.eugdpr.org/. (2017).
[19]
2018. Apache OpenNLP 1.8.3. https://opennlp.apache.org/news/release-183.html/. (2018).
[20]
2018. AUSERA. https://sites.google.com/view/ausera/. (2018).
[21]
2018. CVE: Common Vulnerabilities and Exposures. https://cve.mitre.org/. (2018).
[22]
2018. CWE: Common Weakness Enumeration. https://cwe.mitre.org/. (2018).
[23]
2018. The Common Vulnerability Scoring System. https://www.first.org/cvss/. (2018).
[24]
2019. Apkmonk. (2019). https://www.apkmonk.com
[25]
2019. Scoring security vulnerabilities 101: Introducing CVSS for CVEs. (2019). https://snyk.io/blog/scoring-security-vulnerabilities-101-introducing-cvss-for-cve/
[26]
2019. Towards Improving CVSS. (2019). https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=538368
[27]
Luca Allodi, Sebastian Banescu, Henning Femmer, and Kristian Beckers. 2018. Identifying relevant information cues for vulnerability assessment using CVSS. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. 119--126.
[28]
Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, and Tao Xie. 2017. UiRef: analysis of sensitive user inputs in Android applications. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 23--34.
[29]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. Acm Sigplan Notices 49, 6 (2014), 259--269.
[30]
Sam Castle, Fahad Pervaiz, Galen Weld, Franziska Roesner, and Richard Anderson. 2016. Let's talk money: Evaluating the security challenges of mobile money in the developing world. In Proceedings of the 7th Annual Symposium on Computing for Development. ACM, 4.
[31]
Rajchada Chanajitt, Wantanee Viriyasitavat, and Kim-Kwang Raymond Choo. 2018. Forensic analysis and security assessment of Android m-banking apps. Australian Journal of Forensic Sciences 50, 1 (2018), 3--19.
[32]
Sen Chen, Lingling Fan, Chunyang Chen, Ting Su, Wenhe Li, Yang Liu, and Lihua Xu. 2019. Storydroid: Automated generation of storyboard for Android apps. In Proceedings of the 41st International Conference on Software Engineering. IEEE Press, 596--607.
[33]
Sen Chen, Lingling Fan, Chunyang Chen, Minhui Xue, Yang Liu, and Lihua Xu. 2019. GUI-Squatting Attack: Automated Generation of Android Phishing Apps. IEEE Transactions on Dependable and Secure Computing (2019).
[34]
Sen Chen, Guozhu Meng, Ting Su, Lingling Fan, Minhui Xue, Yinxing Xue, Yang Liu, and Lihua Xu. 2018. Ausera: Large-scale automated security risk assessment of global mobile banking apps. arXiv preprint arXiv:1805.05236 (2018).
[35]
Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, and Lihua Xu. 2018. Are mobile banking apps secure? what can be improved?. In Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM, 797--802.
[36]
Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, and Bo Li. 2018. Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. Computers & Security 73 (2018), 326--344.
[37]
Sen Chen, Minhui Xue, Lingling Fan, Lei Ma, Yang Liu, and Lihua Xu. 2019. How can we craft large-scale Android malware? An automated poisoning attack. In 2019 IEEE 1st International Workshop on Artificial Intelligence for Mobile (AI4Mobile). IEEE, 21--24.
[38]
Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, and Haojin Zhu. 2016. Stormdroid: A streaminglized machine learning-based system for detecting android malware. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 377--388.
[39]
Sen Chen, Minhui Xue, and Lihua Xu. 2016. Towards adversarial detection of mobile malware: poster. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking. ACM, 415--416.
[40]
Tom Chothia, Flavio D Garcia, Chris Heppel, and Chris McMahon Stone. 2017. Why banker Bob (still) can't get TLS right: A Security Analysis of TLS in Leading UK Banking Apps. In International Conference on Financial Cryptography and Data Security. Springer, 579--597.
[41]
Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, and Michael Backes. 2017. Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2187--2200.
[42]
Manuel Egele, David Brumley, Yanick Fratantonio, and Christopher Kruegel. 2013. An empirical study of cryptographic misuse in Android applications. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 73--84.
[43]
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. 2014. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (2014).
[44]
European Parliament and Council of the European Union. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281 (1995), 0031--0050.
[45]
Sascha Fahl, Marian Harbach, Thomas Muders, Lars Baumgärtner, Bernd Freisleben, and Matthew Smith. 2012. Why Eve and Mallory love Android: An analysis of Android SSL (in) security. In Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 50--61.
[46]
Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, and Matthew Smith. 2013. Rethinking SSL development in an appified world. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 49--60.
[47]
Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, and Geguang Pu. 2018. Efficiently manifesting asynchronous programming errors in android apps. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. 486--497.
[48]
Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, and Zhendong Su. 2018. Large-scale Analysis of Framework-specific Exceptions in Android Apps. In Proceedings of the 40th International Conference on Software Engineering (ICSE '18). 408--419.
[49]
Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, and Haojin Zhu. 2016. Poster: Accuracy vs. time cost: Detecting Android malware through pareto ensemble pruning. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, 1748--1750.
[50]
Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, and Shang-Wei Lin. 2019. MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. In 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 61--70.
[51]
Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, and Vitaly Shmatikov. 2012. The most dangerous code in the world: validating SSL certificates in non-browser software. In Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 38--49.
[52]
Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In USENIX Security Symposium. 977--992.
[53]
Kiron Lebeck, Temitope Oluwafemi, Tadayoshi Kohno, and Franziska Roesner. 2015. Rethinking Mobile Money Security for Developing Regions. Technical Report. University of Washington.
[54]
Li Li, Alexandre Bartel, Tegawendé F Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, and Patrick McDaniel. 2015. Iccta: Detecting inter-component privacy leaks in Android apps. In Proceedings of the 37th International Conference on Software Engineering-Volume 1. IEEE Press, 280--291.
[55]
Chia-Chi Lin, Hongyang Li, Xiao-yong Zhou, and XiaoFeng Wang. 2014. Screenmilker: How to Milk Your Android Screen for Secrets. In NDSS.
[56]
Yepang Liu, Chang Xu, and Shing-Chi Cheung. 2014. Characterizing and Detecting Performance Bugs for Smartphone Applications. In Proceedings of the 36th International Conference on Software Engineering (ICSE 2014). 1013--1024.
[57]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013).
[58]
Nuthan Munaiah and Andrew Meneely. 2016. Vulnerability severity scoring and bounties: Why the disconnect?. In Proceedings of the 2nd International Workshop on Software Analytics. ACM, 8--14.
[59]
Prateek Panda. 2015. Security Report of Top 100 Mobile Banking Apps-APAC. Technical Report. Appknox.
[60]
Prateek Panda. 2016. A Security Analysis of The Top 500 Global E-commerce Mobile Apps in USA, UK, Australia, Singapore and India. Technical Report. Appknox.
[61]
Swathi Parasa and Lynn Margaret Batten. 2016. Mobile Money in the Australasian Region-A Technical Security Perspective. In International Conference on Applications and Techniques in Information Security. Springer, 154--162.
[62]
Siegfried Rasthofer, Steven Arzt, and Eric Bodden. 2014. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. In NDSS.
[63]
Bradley Reaves, Jasmine Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, and Kevin RB Butler. 2017. Mo (bile) money, Mo (bile) Problems: Analysis of branchless banking applications. ACM Transactions on Privacy and Security (TOPS) 20, 3 (2017), 11.
[64]
Bradley Reaves, Nolen Scaife, Adam M Bates, Patrick Traynor, and Kevin RB Butler. 2015. Mo (bile) Money, Mo (bile) Problems: Analysis of Branchless Banking Applications in the Developing World. In USENIX Security. 17--32.
[65]
David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, and Latifur Khan. 2014. Smv-hunter: Large scale, automated detection of SSL/TLS man-in-the-middle vulnerabilities in Android apps. In In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS 14). Citeseer.
[66]
Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, and Yarik Markov. 2017. The First Collision for Full SHA-1. In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings. 570--596.
[67]
Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, and Zhendong Su. 2017. Guided, stochastic model-based GUI testing of Android apps. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. 245--256.
[68]
Chongbin Tang, Sen Chen, Lingling Fan, Lihua Xu, Yang Liu, Zhushou Tang, and Liang Dou. 2019. A large-scale empirical study on industrial fake apps. In Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice. IEEE Press, 183--192.
[69]
VF Taylor and I Martinovic. 2017. A Longitudinal Study of Financial Apps in the Google Play Store. In Financial Cryptography and Data Security, Lecture Notes in Computer Science (LNCS). Springer Berlin Heidelberg.
[70]
Chris Thompson, Ryan Leininger, and Roshani Bhatt. 2017. Mobile Banking Applications: Security Challenges for Banks. Technical Report. Accenture & NowSecure Inc.
[71]
Raja Vallée-Rai, Phong Co, Etienne Gagnon, Laurie Hendren, Patrick Lam, and Vijay Sundaresan. 1999. Soot - a Java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative research. IBM Press, 13.
[72]
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. 2005. Finding collisions in the full SHA-1. In Crypto, Vol. 3621. Springer, 17--36.
[73]
Xiaoyun Wang and Hongbo Yu. 2005. How to break MD5 and other hash functions. In Eurocrypt, Vol. 3494. Springer, 19--35.
[74]
Lili Wei, Yepang Liu, and Shing-Chi Cheung. 2016. Taming Android Fragmentation: Characterizing and Detecting Compatibility Issues for Android Apps. In Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (ASE 2016). ACM, New York, NY, USA, 226--237.

Cited By

View all
  • (2025)Machine learning-driven exogenous neural architecture for nonlinear fractional cybersecurity awareness model in mobile malware propagationChaos, Solitons & Fractals10.1016/j.chaos.2024.115948192(115948)Online publication date: Mar-2025
  • (2025)Automatic Inspection of Static Application Security Testing (SAST) Reports via Large Language Model ReasoningArtificial Intelligence Logic and Applications10.1007/978-981-96-0354-1_11(128-142)Online publication date: 31-Jan-2025
  • (2024)Peep with a mirrorProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699019(2119-2135)Online publication date: 14-Aug-2024
  • Show More Cited By

Index Terms

  1. An empirical assessment of security risks of global Android banking apps

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering
    June 2020
    1640 pages
    ISBN:9781450371216
    DOI:10.1145/3377811
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    • KIISE: Korean Institute of Information Scientists and Engineers
    • IEEE CS

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. empirical study
    2. mobile banking apps
    3. vulnerability
    4. weakness

    Qualifiers

    • Research-article

    Funding Sources

    • National Research Foundation, Prime Ministers Office, Singapore under its National Cybersecurity R&D Program
    • National Satellite of Excellence in Trustworthy Software System
    • Singapore National Research Foundation under NCR

    Conference

    ICSE '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 276 of 1,856 submissions, 15%

    Upcoming Conference

    ICSE 2025

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)148
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Machine learning-driven exogenous neural architecture for nonlinear fractional cybersecurity awareness model in mobile malware propagationChaos, Solitons & Fractals10.1016/j.chaos.2024.115948192(115948)Online publication date: Mar-2025
    • (2025)Automatic Inspection of Static Application Security Testing (SAST) Reports via Large Language Model ReasoningArtificial Intelligence Logic and Applications10.1007/978-981-96-0354-1_11(128-142)Online publication date: 31-Jan-2025
    • (2024)Peep with a mirrorProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699019(2119-2135)Online publication date: 14-Aug-2024
    • (2024)A Comprehensive Study on Static Application Security Testing (SAST) Tools for AndroidIEEE Transactions on Software Engineering10.1109/TSE.2024.348804150:12(3385-3402)Online publication date: 1-Dec-2024
    • (2024)Android malware defense through a hybrid multi-modal approachJournal of Network and Computer Applications10.1016/j.jnca.2024.104035(104035)Online publication date: Sep-2024
    • (2024)What is an app store? The software engineering perspectiveEmpirical Software Engineering10.1007/s10664-023-10362-329:1Online publication date: 2-Jan-2024
    • (2024)Privacy and Security of Mobile Banking: A PRISMA-Centric Review of Android Finance ApplicationsProceedings of the Future Technologies Conference (FTC) 2024, Volume 210.1007/978-3-031-73122-8_2(11-29)Online publication date: 5-Nov-2024
    • (2023)Sustainable Financial Development Through Mobile Payment: Using SEM-ANN AnalysisVision: The Journal of Business Perspective10.1177/09722629231168696Online publication date: 25-Sep-2023
    • (2023)Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment ApplicationsProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617102(143-157)Online publication date: 16-Oct-2023
    • (2023)Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android AppsProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616329(1255-1267)Online publication date: 30-Nov-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media