Device Risk Analysis Protocol for SMS-Based OTP Authentication

被引:0
|
作者
Bartlomiejczyk, Maciej [1 ]
El Fray, Imed [1 ]
机构
[1] West Pomeranian Univ Technol, Fac Comp Sci & Informat Technol, PL-70310 Szczecin, Poland
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Authentication; Codes; Malware; Phishing; Protocols; Message services; Brute force attacks; Mobile security; malware attacks; mobile device security; risk assessment protocol; SMS one-time password (OTP); two-factor authentication (2FA); ANDROID MALWARE DETECTION; TIME PASSWORD; SECURITY;
D O I
10.1109/ACCESS.2024.3445931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-factor authentication (2FA) is widely recognized as a secure authentication method. Despite the availability of multiple authentication methods, SMS one-time password (OTP) remains popular. However, SMS OTP is vulnerable to several attacks that pose a significant threat to the authentication process. Due to the risk of attacks, particularly those based on social engineering and malware related to endpoint compromise, the National Institute of Standards and Technology (NIST) has removed SMS OTP as a recommended delivery channel. This paper analyses two different variants of passive and active malware attacks on SMS OTP for Android mobile devices. In response to the identified threats, a risk assessment protocol is proposed. This protocol includes a malware detection algorithm to assess device risk and determine whether SMS OTP can be used for user authentication. The security level of the authentication process depends on the user's specific device. The proposed malware detection algorithm was tested on publicly available applications provided by users participating in the research. Two application datasets were scanned during the research. The first dataset consisted of 520 applications available on the Play Store, and the second dataset consisted of 1,200 applications provided by users who participated in the research.
引用
收藏
页码:123177 / 123192
页数:16
相关论文
共 50 条
  • [21] SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware
    Wang, Chun-Yi
    You, Chi-Yu
    Hsu, Fu -Hau
    Lee, Chia-Hao
    Liu, Che-Hao
    Zhuang, YungYu
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 156 : 25 - 37
  • [22] SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware
    Wang, Chun-Yi
    You, Chi-Yu
    Hsu, Fu-Hau
    Lee, Chia-Hao
    Liu, Che-Hao
    Zhuang, YungYu
    Journal of Parallel and Distributed Computing, 2021, 156 : 25 - 37
  • [23] UjU : SMS-Based Applications Made Easy
    Lu Wei-Chih
    Tierney, Matt
    Chen, Jay
    Kazi, Faiz
    Hubard, Alfredo
    Pasquel, Jesus Garcia
    Subramanian, Lakshminarayanan
    Rao, Bharat
    PROCEEDINGS OF THE FIRST ACM SYMPOSIUM ON COMPUTING FOR DEVELOPMENT (ACM DEV 2010), 2010,
  • [24] EpxEpilepsy: A SMS-Based Intervention for Patients with Epilepsy
    Duggirala, Rajat
    Ma, Sirui
    Peters, Robert
    Zhang, Stephanie
    Ross, Will
    NEUROLOGY, 2018, 90
  • [25] SMS-Based Mobile Botnet Detection Module
    Alzahrani, Abdullah J.
    Ghorbani, Ali A.
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 234 - 240
  • [26] INSIGHT CHANGE IN SCHIZOPHRENIA: A SMS-BASED APPROACH
    Montes, J. M.
    Medina, E.
    Gomez Beneyto, M.
    Maurino, J.
    EUROPEAN PSYCHIATRY, 2012, 27
  • [27] An SMS-based e-government model
    Susanto, Tony Dwi
    Goodwin, Robert
    ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: SOFTWARE AGENTS AND INTERNET COMPUTING, 2006, : 185 - +
  • [28] SMS-based surveys: strategies to improve participation
    Balabanis, George
    Mitchell, Vincent-Wayne
    Heinonen-Mavrovouniotis, Sarah
    INTERNATIONAL JOURNAL OF ADVERTISING, 2007, 26 (03) : 369 - 385
  • [29] An SMS-based aftercare programme for Bulimia nervosa
    Bauer, S.
    Okon, E.
    PSYCHOTHERAPIE PSYCHOSOMATIK MEDIZINISCHE PSYCHOLOGIE, 2007, 57 (02) : 79 - 80
  • [30] A SMS-Based Real-time Device Monitoring and Abnormality Recovery System for Computer Rooms
    Hu, Chung-Chiang
    Li, Shing-Han
    Tsai, Tien-Wei
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3750 - +