Security analysis on the authentication mechanisms of Korean popular messengers

被引:0
|
作者
Shin, Donghwi [1 ]
Choi, Youngsung [1 ]
Lee, Yunho [1 ]
Park, Sangjoon [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The "NateOn" messenger is the most popular messenger in Korea (It has 17,160,000 users in Korea). In this paper, we will analyze the security of authentication mechanism of the NateOn. We will show that the "NateOn Ver 3.5.15.0(600)" is very vulnerable to the replay attack and the dictionary attack. Furthermore, we will show that other messengers such as "BuddyBuddy Ver 5.8" (It has 5,980,000 users in Korea), "Daum Touch Ver 5.06101300" (It has 2,384,000 users in Korea), etc. have the similar security problems.
引用
收藏
页码:547 / +
页数:2
相关论文
共 50 条
  • [1] AUTHENTICATION AND SECURITY MECHANISMS FOR DIGITAL IMAGES
    WONG, ST
    HUANG, HK
    GOULD, RG
    RADIOLOGY, 1995, 197 : 258 - 258
  • [2] Unboxing fog security: a review of fog security and authentication mechanisms
    Kaliya, Neha
    Pawar, Digambar
    COMPUTING, 2023, 105 (12) : 2793 - 2819
  • [3] Unboxing fog security: a review of fog security and authentication mechanisms
    Neha Kaliya
    Digambar Pawar
    Computing, 2023, 105 : 2793 - 2819
  • [4] A Review on Secure Authentication Mechanisms for Mobile Security
    Ul Hasan, Syed Shabih
    Ghani, Anwar
    Daud, Ali
    Akbar, Habib
    Khan, Muhammad Faizan
    SENSORS, 2025, 25 (03)
  • [5] A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms
    Broders, Nicolas
    Martinie, Celia
    Palanque, Philippe
    Winckler, Marco
    Halunen, Kimmo
    HUMAN-CENTERED SOFTWARE ENGINEERING, HCSE 2020, 2020, 12481 : 61 - 83
  • [6] Advertising in Popular Instant Messengers
    Lugovoy, D.
    Pobedinskaya, E.
    PROCEEDINGS OF THE 2018 IEEE COMMUNICATION STRATEGIES IN DIGITAL SOCIETY WORKSHOP (2018 COMSDS), 2018, : 39 - 41
  • [7] Security Analysis of TLS Authentication
    Ranjan, Aditya Kaushal
    Kumar, Vijay
    Hussain, Muzzammil
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1356 - 1360
  • [8] Security Assist Mechanisms for Industrial Control Systems with Authentication
    Tsou, Chia-Wei
    Ma, Yi-Wei
    Tu, Yi-Hao
    Chen, Jiann-Liang
    2023 25TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, ICACT, 2023, : 186 - 188
  • [9] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [10] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    New Generation Computing, 2001, 19 : 283 - 299