Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps


KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 1, pp. 9-16, Jan. 2019
https://doi.org/10.3745/KTCCS.2019.8.1.9,   PDF Download:
Keywords: Android, virtual keyboard, Banking App, Security, Password
Abstract

Smartphones are becoming a portable computer. As a result, even the most sensitive financial application services are now available anywhere on the smartphone. Compared to general PCs, smartphones communicate with external devices through various channels such as wireless internet, mobile communication network, Bluetooth, and NFC, and a wide variety of applications are provided. Therefore, if vulnerabilities exist, the possibility of attack damage increases. In this paper, we analyze the vulnerabilities of dynamic virtual keyboards used in login of banking apps of smartphones with various physical constraints and propose countermeasures.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
T. Cho and S. Choi, "Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps," KIPS Transactions on Computer and Communication Systems, vol. 8, no. 1, pp. 9-16, 2019. DOI: https://doi.org/10.3745/KTCCS.2019.8.1.9.

[ACM Style]
Taenam Cho and SookHee Choi. 2019. Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps. KIPS Transactions on Computer and Communication Systems, 8, 1, (2019), 9-16. DOI: https://doi.org/10.3745/KTCCS.2019.8.1.9.