Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/5944
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Özkan, C. | - |
dc.contributor.author | Bıçakcı, Kemal | - |
dc.date.accessioned | 2021-09-11T15:20:57Z | - |
dc.date.available | 2021-09-11T15:20:57Z | - |
dc.date.issued | 2020 | en_US |
dc.identifier.citation | 13th International Conference on Information Security and Cryptology, ISCTURKEY 2020, 3 December 2020 through 4 December 2020, , 166977 | en_US |
dc.identifier.isbn | 9781665418638 | - |
dc.identifier.uri | https://doi.org/10.1109/ISCTURKEY51113.2020.9308020 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/5944 | - |
dc.description.abstract | Deploying Two-Factor Authentication (2FA) is one of the highly-recommended security mechanism against account hijacking attacks. One of the common methods for 2FA is to bring something you know and something you have factors together. For the latter we have options including USB sticks, smart cards, SMS verification, and one-time password values generated by mobile applications (soft OTP). Due to the cost and convenience reasons, deploying 2FA via soft OTPs is more common. However, unlike smart cards which have tamper resistance property, attackers can access smartphones remotely or physically so that they can fetch shared secret seed value - an important security risk for mobile authenticators. For this reason, it is critical to analyze mobile authenticator applications in this context. In this paper, we report our findings after analyzing eleven different Android authenticator applications. We report that we have fetched cleartext shared secret seed value from storage in five applications and from memory in seven applications using standard reverse engineering techniques and open-source tools. © 2020 IEEE. | en_US |
dc.description.sponsorship | Aselsan;Havelsan;Huawei;NETAS;TURKSAT | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Android | en_US |
dc.subject | Android Key Store | en_US |
dc.subject | Authentication | en_US |
dc.subject | Cryptographic Controls | en_US |
dc.subject | Mobile Authenticator | en_US |
dc.subject | Mobile Security | en_US |
dc.subject | Obfuscation | en_US |
dc.subject | ProGuard | en_US |
dc.subject | Reverse Engineering | en_US |
dc.subject | Two Factor Authentication | en_US |
dc.title | Security Analysis of Mobile Authenticator Applications | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 18 | en_US |
dc.identifier.endpage | 30 | en_US |
dc.identifier.wos | WOS:000676395800004 | en_US |
dc.identifier.scopus | 2-s2.0-85101066889 | en_US |
dc.institutionauthor | Bıçakcı, Kemal | - |
dc.identifier.doi | 10.1109/ISCTURKEY51113.2020.9308020 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.relation.conference | 13th International Conference on Information Security and Cryptology, ISCTURKEY 2020 | en_US |
item.languageiso639-1 | en | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | none | - |
item.openairetype | Conference Object | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
WEB OF SCIENCETM
Citations
7
checked on Nov 2, 2024
Page view(s)
68
checked on Oct 28, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.