Abstract
As of 2021, there are 14.91 billion mobile devices, which shows that cell phones continues to be a vital part of present day human’s existence and the Android Operating system is the most used OS in these cell phones. Even though there are alot of Apps available to use but Application utilization and cell phone penetration are as yet developing at a consistent rate, with practically no indications of dialing back soon. Apps on our mobile devices make our lives easier by providing multiple features such quick payments and more. Nowadays, there are a lot of banks that offer mobile banking services using apps and increase in online payments using smartphones has been observed. Due to the massive and dynamic nature of mobile banking apps, they pose a risk of security breaches. Because vulnerabilities can lead to huge financial losses, we have presented a comprehensive empirical studies of the security risks of global banking apps in order to provide useful insights and improve security. These vulnerabilities may lead to serious financial losses due to data-related weaknesses in banking apps. In this paper, we looked at mobile banking app vulnerabilities as well as a security difficulties with mobile internet banking applications, and then studied a few security strategies to address the relevant security issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on Android security. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 623–634,(2013). https://doi.org/10.1145/2508859.2516728
Pousttchi, K., Schuring, M.: Assessment of today’s mobile banking applications from the view of customer requirements. In: Proceedings of the 37th Annual Hawaii international Conference (2004)
Shashank Gupta et al. 2015. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In Proceedings of the 12th ACM International Conference on Computing Frontiers (CF ’15). Association for Computing Machinery, New York, NY, USA, Article 59, pp. 1–8. https://doi.org/10.1145/2742854.2745719
Yuan, H., Tang, Y., Wenjuan, S., Liu, L.: A detection method for android application security based on TF-IDF and machine learning. PloS One 15, e0238694 (2020). https://doi.org/10.1371/journal.pone.0238694
Sanchez, A.: Security Flaws in mobile banking apps identified by researcher. Out-Law.com, 13 Jan 2014. [Online]. Available: www.out-law.com/en/articles/2014/january/security-flaws-inmobile-banking-apps-identifie d-by-researcher/. Accessed 25 Oct 2015
Gupta, S., et al.: Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int. J. Cloud Appl. Comput. (IJCAC) 7, 1–43 (2017). https://doi.org/10.4018/IJCAC.2017070101
Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Hulme, G. (ed)Services Seeks to Bring e-Business to Small Businesses, p. 21. In Informationweek.com (2000)
de la Puente, S.A.J.F.: Virus attack to the PC bank. In: Security Technology Proceedings
Sharma, R., Sharma, T.P., Sharma, A.K.: Detecting and preventing misbehaving intruders in the Internet of vehicles. Int. J. Cloud Appl. Comput. (IJCAC) 12(1), 1–21 (2022)
Singh, S., Kaur, K., Aggarwal, A.: Emerging trends and limitations in technology and system of ubiquitous computing. Int. J. Adv. Res. Comput. Sci. 5, 174–178 (2014)
Crosman, P.: First major mobile banking security threat hits the US. American Banker, 13 June 2014. [Online]. Available: www.americanbanker.com/issues/179_114/first-major-mobilebanking-security-threat-hits-the-us-1068100-1.html. Accessed 26 Oct 2015
Ling, Z., Hao, Z.J.: An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system. Int. J. Semant. Web Inf. Syst. (IJSWIS) 18(1), 1–25 (2022)
Webroot: The risks and rewards of mobile banking apps. Webroot, United States (2014). [18] Zhang, Y., W. Lee, W.: Intrusion detection in wireless ad-hoc networks. In: ACM/IEEE MobiCom (2000)
Singh, S.K.: Linux Yourself: Concept and Programming (1st ed.). Chapman and Hall/CRC. https://doi.org/10.1201/9780429446047 (2021)
Filiol, E., Irolla, P.: Security of Mobile Banking ... and of Others, BlackHat Asia, pp. 1–22 (2015)
Kumar, S., Singh, S.K., Aggarwal, N., Aggarwal, K.: Evaluation of automatic parallelization algorithms to minimize speculative parallelism overheads: an experiment. J. Discrete Math. Sci. Crypt. 24(5), 1517–1528 (2021)
Brdesee, H.S., Alsaggaf, W., Aljohani, N., Hassan, S.U.: Predictive model using a machine learning approach for enhancing the retention rate of students at-risk. Int. J. Semant. Web Inf. Syst. (IJSWIS) 18(1), 1–21 (2022)
Cooney, M..: 10 common mobile security problems to attack. PC world. [Online]. Available www.pcworld.com/article/2010278/10-common-mobile-securityproblems-to-attack.html. Accessed 26 Oct 2015
Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of “Piggybacked” mobile applications. https://doi.org/10.1145/2435349.2435377 (2013)
Zhou, Z., et al.: A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic. Neural Comput. Applic. (2021). https://doi.org/10.1007/s00521-021-06389-6
Mallat, N., Rossi, M., Tuunainen, V.K.: Mobile banking services. Commun. ACM 47(May), 42–46 (2004)
Nie, J., Hu, X.: Mobile banking information security and protection methods. Comput. Sci. Softw. Eng. (2008)
Gupta, A., Singh, S.K., Chopra, M., Gill, S.S.: An inquisitive prospect on the shift toward online media, before, during, and after the COVID-19 pandemic: a technological analysis (2022)
Verma, P., Charan, C., Fernando, X., Ganesan, S. (eds.): Advances in data computing, communication and security. Lect. Notes Data Eng. Commun. Technol. 106
Chopra, M., Singh, S.K., Sharma, A., Gill, S.S.: A comparative study of generative adversarial networks for text-to-image synthesis. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 14(1), 1–12 (2022). https://doi.org/10.4018/IJSSCI.300364
Singh, A., Singh, S.K., Mittal, A.: A review on dataset acquisition techniques in gesture recognition from Indian sign language. Adv. Data Comput. Commun. Secur. 305–313 (2022). https://doi.org/10.1007/978-981-16-8403-6_20
Narendiran, C., Rabara, S.A., Rajendran, N.: Public key infrastructure for mobile banking security. In: Global Mobile Congress, pp. 1–6 (2009)
Dai, W., Tang, Y.: Research on security payment technology based on mobile e-Commerce. In: e-Business and Information System Security, pp. 1–4 (2010)
Singh, S.K., Kumar, A., Gupta, S., Madan, R.: Architectural Performance of WiMAX over WiFi with Reliable QoS over wireless communication. Int. J. Adv. Networking Appl. (IJANA) 03(01), 1016–1023 (2011). [EISSN: 0975–0282]
Nachenberg, C.: A window into mobile device security. Technical report, Symantec (2011)
Singh, I., Singh, S.K., Singh, R., Kumar, S.: Efficient loop unrolling factor prediction algorithm using machine learning models. In: 2022 3rd International Conference for Emerging Technology (INCET), pp. 1–8 (2022). https://doi.org/10.1109/INCET54531.2022.9825092
Aggarwal, K., Singh, S.K., Chopra, M., Kumar, S., Colace, F.: Deep learning in robotics for strengthening industry 4.0.: opportunities, challenges and future directions. In: Nedjah, N., Abd El-Latif, A.A., Gupta, B.B., Mourelle, L.M. (eds.) Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. Studies (2022)
Singh, S.K., Singh, R.K., Bhatia, M.: Design flow of reconfigurable embedded system architecture using LUTs/PLAs. In: 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 385–390 (2012). https://doi.org/10.1109/PDGC.2012.6449851
Gupta, S., Singh, S.K., Jain, R: Analysis and optimisation of various transmission issues in video streaming over Bluetooth . Int. J. Comput. Appl. 11(7), 44–48 9 (2010)
Chopra, M., et al.: Analysis and prognosis of sustainable development goals using big data-based approach during COVID-19 pandemic. Sustain. Technol. Entrepreneurship. www.sciencedirect.com/science/article/pii/S2773032822000128 (2022)
Sharma, S.K., Singh, S.K., Panja, S.C.: Human factors of vehicle automation. Auton. Driving Adv. Driver-Assistance Syst. (ADAS), 335–358 6 (2021)
Singh, R., Rana, R., Singh, S.K.: Performance evaluation of VGG models in detection of wheat rust. Asian J. Comput. Sci. Technol. 7(3), 76–81 5 (2018)
Ghosh, Security and Privacy for E-Business
Singh, S.K., Singh, R.K., Bhatia, M.P.S., Singh, S.P.: CAD for delay optimization of symmetrical FPGA architecture through hybrid LUTs/PLAs (2013)
Meghanathan, N., Nagamalai, D., Chaki, N. (eds.): Advances in Computing and Information Technology. In: Advances in Intelligent Systems and Computing, vol. 178. Springer, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31600-5_57
Kaur, P., Singh, S.K., Singh, I., Kumar, S.: Exploring convolutional neural network in computer vision based image classification. https://ceur-ws.org/Vol-3080/21.pdf (2022)
Tsai, C., Chen, C., Zhuang, D.: Secure OTP and biometric verification scheme for mobile banking. In: 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, pp. 138–141 (2012). https://doi.org/10.1109/MUSIC.2012.31
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sharma, A., Singh, S.K., Kumar, S., Chhabra, A., Gupta, S. (2023). Security of Android Banking Mobile Apps: Challenges and Opportunities. In: Nedjah, N., Martínez Pérez, G., Gupta, B.B. (eds) International Conference on Cyber Security, Privacy and Networking (ICSPN 2022). ICSPN 2021. Lecture Notes in Networks and Systems, vol 599. Springer, Cham. https://doi.org/10.1007/978-3-031-22018-0_39
Download citation
DOI: https://doi.org/10.1007/978-3-031-22018-0_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-22017-3
Online ISBN: 978-3-031-22018-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)