publication . Article . 2018

efficient protection of android applications through user authentication using peripheral devices

Jinseong Kim; Im Y. Jung;
Open Access
  • Published: 01 Apr 2018 Journal: Sustainability, volume 10, page 1,290 (eissn: 2071-1050, Copyright policy)
  • Publisher: MDPI AG
Abstract
Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. However, by manipulating these physical device values, an attacker can circumvent the authentication by executing a Same Identifier Attack and obtain the same application privileges as the user. In our work, WhatsApp, KakaoTalk, Facebook, Amazon, and Syrup were subjected to the Same Identifier Attack, and it was found that an attacker could gain the same privileges as the user, in all five applications. To solve such...
Subjects
free text keywords: Renewable Energy, Sustainability and the Environment, Geography, Planning and Development, Management, Monitoring, Policy and Law, Android (operating system), Application security, Authentication, Economics, Information sensitivity, Environmental resource management, business.industry, business, Execution time, Encryption, Identifier, Nexus (standard), Computer security, computer.software_genre, computer, Android vulnerability, Android protection, Same Identifier Attack, User Authentication using Peripheral Devices, Android security, Environmental effects of industries and plants, TD194-195, Renewable energy sources, TJ807-830, Environmental sciences, GE1-350
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2018

efficient protection of android applications through user authentication using peripheral devices

Jinseong Kim; Im Y. Jung;