Security analysis on the authentication mechanisms of Korean popular messengers

被引:0
|
作者
Shin, Donghwi [1 ]
Choi, Youngsung [1 ]
Lee, Yunho [1 ]
Park, Sangjoon [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The "NateOn" messenger is the most popular messenger in Korea (It has 17,160,000 users in Korea). In this paper, we will analyze the security of authentication mechanism of the NateOn. We will show that the "NateOn Ver 3.5.15.0(600)" is very vulnerable to the replay attack and the dictionary attack. Furthermore, we will show that other messengers such as "BuddyBuddy Ver 5.8" (It has 5,980,000 users in Korea), "Daum Touch Ver 5.06101300" (It has 2,384,000 users in Korea), etc. have the similar security problems.
引用
收藏
页码:547 / +
页数:2
相关论文
共 50 条
  • [21] Security Analysis on Remote User Authentication Methods
    Soni, Mukesh
    Patel, Tejas
    Jain, Anuj
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 506 - 513
  • [22] Security Analysis of Three Password Authentication Schemes
    Shim, Kyung-Ah
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2011, 17 (11) : 1623 - 1633
  • [23] Security Analysis and Improvement of Fingerprint Authentication for Smartphones
    Jo, Young-Hoo
    Jeon, Seong-Yun
    Im, Jong-Hyuk
    Lee, Mun-Kyu
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [24] Security analysis for authentication and authorisation in mobile phone
    Lewandowski, Piotr
    Felkner, Anna
    Janiszewski, Marek
    PRZEGLAD ELEKTROTECHNICZNY, 2019, 95 (08): : 132 - 138
  • [25] Security Analysis of ECC Based Authentication Protocols
    Khatwani, Chanchal
    Roy, Swapnoneel
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1167 - 1172
  • [26] Security Analysis of Some RFID Authentication Protocols
    Wang Shaohui
    Wang Faxing
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
  • [27] Security Analysis of Robust User Authentication Protocol
    Pura, Mihai-Lica
    Patriciu, Victor-Valeriu
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 457 - 460
  • [28] VANET authentication protocols: security analysis and a proposal
    Otto B. Piramuthu
    Matthew Caesar
    The Journal of Supercomputing, 2023, 79 : 2153 - 2179
  • [29] Security Analysis of Authentication Overlaying Tag Signal
    Song Huawei
    Jin, Liang
    Zhang, Shengjun
    WIRELESS INTERNET (WICON 2017), 2018, 230 : 173 - 180
  • [30] The Security Analysis of Popular Instant Messaging Applications
    Zhang, Lijun
    Ji, Qingbing
    Yu, Fei
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 1324 - 1328