Skip to main content

Security of Android Banking Mobile Apps: Challenges and Opportunities

  • Conference paper
  • First Online:
International Conference on Cyber Security, Privacy and Networking (ICSPN 2022) (ICSPN 2021)

Abstract

As of 2021, there are 14.91 billion mobile devices, which shows that cell phones continues to be a vital part of present day human’s existence and the Android Operating system is the most used OS in these cell phones. Even though there are alot of Apps available to use but Application utilization and cell phone penetration are as yet developing at a consistent rate, with practically no indications of dialing back soon. Apps on our mobile devices make our lives easier by providing multiple features such quick payments and more. Nowadays, there are a lot of banks that offer mobile banking services using apps and increase in online payments using smartphones has been observed. Due to the massive and dynamic nature of mobile banking apps, they pose a risk of security breaches. Because vulnerabilities can lead to huge financial losses, we have presented a comprehensive empirical studies of the security risks of global banking apps in order to provide useful insights and improve security. These vulnerabilities may lead to serious financial losses due to data-related weaknesses in banking apps. In this paper, we looked at mobile banking app vulnerabilities as well as a security difficulties with mobile internet banking applications, and then studied a few security strategies to address the relevant security issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on Android security. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 623–634,(2013). https://doi.org/10.1145/2508859.2516728

  2. Pousttchi, K., Schuring, M.: Assessment of today’s mobile banking applications from the view of customer requirements. In: Proceedings of the 37th Annual Hawaii international Conference (2004)

    Google Scholar 

  3. Shashank Gupta et al. 2015. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In Proceedings of the 12th ACM International Conference on Computing Frontiers (CF ’15). Association for Computing Machinery, New York, NY, USA, Article 59, pp. 1–8. https://doi.org/10.1145/2742854.2745719

  4. Yuan, H., Tang, Y., Wenjuan, S., Liu, L.: A detection method for android application security based on TF-IDF and machine learning. PloS One 15, e0238694 (2020). https://doi.org/10.1371/journal.pone.0238694

    Article  Google Scholar 

  5. Sanchez, A.: Security Flaws in mobile banking apps identified by researcher. Out-Law.com, 13 Jan 2014. [Online]. Available: www.out-law.com/en/articles/2014/january/security-flaws-inmobile-banking-apps-identifie d-by-researcher/. Accessed 25 Oct 2015

  6. Gupta, S., et al.: Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int. J. Cloud Appl. Comput. (IJCAC) 7, 1–43 (2017). https://doi.org/10.4018/IJCAC.2017070101

    Article  Google Scholar 

  7. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Hulme, G. (ed)Services Seeks to Bring e-Business to Small Businesses, p. 21. In Informationweek.com (2000)

    Google Scholar 

  8. de la Puente, S.A.J.F.: Virus attack to the PC bank. In: Security Technology Proceedings

    Google Scholar 

  9. Sharma, R., Sharma, T.P., Sharma, A.K.: Detecting and preventing misbehaving intruders in the Internet of vehicles. Int. J. Cloud Appl. Comput. (IJCAC) 12(1), 1–21 (2022)

    MathSciNet  Google Scholar 

  10. Singh, S., Kaur, K., Aggarwal, A.: Emerging trends and limitations in technology and system of ubiquitous computing. Int. J. Adv. Res. Comput. Sci. 5, 174–178 (2014)

    Google Scholar 

  11. Crosman, P.: First major mobile banking security threat hits the US. American Banker, 13 June 2014. [Online]. Available: www.americanbanker.com/issues/179_114/first-major-mobilebanking-security-threat-hits-the-us-1068100-1.html. Accessed 26 Oct 2015

  12. Ling, Z., Hao, Z.J.: An intrusion detection system based on normalized mutual information antibodies feature selection and adaptive quantum artificial immune system. Int. J. Semant. Web Inf. Syst. (IJSWIS) 18(1), 1–25 (2022)

    Google Scholar 

  13. Webroot: The risks and rewards of mobile banking apps. Webroot, United States (2014). [18] Zhang, Y., W. Lee, W.: Intrusion detection in wireless ad-hoc networks. In: ACM/IEEE MobiCom (2000)

    Google Scholar 

  14. Singh, S.K.: Linux Yourself: Concept and Programming (1st ed.). Chapman and Hall/CRC. https://doi.org/10.1201/9780429446047 (2021)

  15. Filiol, E., Irolla, P.: Security of Mobile Banking ... and of Others, BlackHat Asia, pp. 1–22 (2015)

    Google Scholar 

  16. Kumar, S., Singh, S.K., Aggarwal, N., Aggarwal, K.: Evaluation of automatic parallelization algorithms to minimize speculative parallelism overheads: an experiment. J. Discrete Math. Sci. Crypt. 24(5), 1517–1528 (2021)

    Google Scholar 

  17. Brdesee, H.S., Alsaggaf, W., Aljohani, N., Hassan, S.U.: Predictive model using a machine learning approach for enhancing the retention rate of students at-risk. Int. J. Semant. Web Inf. Syst. (IJSWIS) 18(1), 1–21 (2022)

    Article  Google Scholar 

  18. Cooney, M..: 10 common mobile security problems to attack. PC world. [Online]. Available www.pcworld.com/article/2010278/10-common-mobile-securityproblems-to-attack.html. Accessed 26 Oct 2015

  19. Zhou, W., Zhou, Y., Grace, M., Jiang, X., Zou, S.: Fast, scalable detection of “Piggybacked” mobile applications. https://doi.org/10.1145/2435349.2435377 (2013)

  20. Zhou, Z., et al.: A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic. Neural Comput. Applic. (2021). https://doi.org/10.1007/s00521-021-06389-6

  21. Mallat, N., Rossi, M., Tuunainen, V.K.: Mobile banking services. Commun. ACM 47(May), 42–46 (2004)

    Article  Google Scholar 

  22. Nie, J., Hu, X.: Mobile banking information security and protection methods. Comput. Sci. Softw. Eng. (2008)

    Google Scholar 

  23. Gupta, A., Singh, S.K., Chopra, M., Gill, S.S.: An inquisitive prospect on the shift toward online media, before, during, and after the COVID-19 pandemic: a technological analysis (2022)

    Google Scholar 

  24. Verma, P., Charan, C., Fernando, X., Ganesan, S. (eds.): Advances in data computing, communication and security. Lect. Notes Data Eng. Commun. Technol. 106

    Google Scholar 

  25. Chopra, M., Singh, S.K., Sharma, A., Gill, S.S.: A comparative study of generative adversarial networks for text-to-image synthesis. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 14(1), 1–12 (2022). https://doi.org/10.4018/IJSSCI.300364

  26. Singh, A., Singh, S.K., Mittal, A.: A review on dataset acquisition techniques in gesture recognition from Indian sign language. Adv. Data Comput. Commun. Secur. 305–313 (2022). https://doi.org/10.1007/978-981-16-8403-6_20

  27. Narendiran, C., Rabara, S.A., Rajendran, N.: Public key infrastructure for mobile banking security. In: Global Mobile Congress, pp. 1–6 (2009)

    Google Scholar 

  28. Dai, W., Tang, Y.: Research on security payment technology based on mobile e-Commerce. In: e-Business and Information System Security, pp. 1–4 (2010)

    Google Scholar 

  29. Singh, S.K., Kumar, A., Gupta, S., Madan, R.: Architectural Performance of WiMAX over WiFi with Reliable QoS over wireless communication. Int. J. Adv. Networking Appl. (IJANA) 03(01), 1016–1023 (2011). [EISSN: 0975–0282]

    Google Scholar 

  30. Nachenberg, C.: A window into mobile device security. Technical report, Symantec (2011)

    Google Scholar 

  31. Singh, I., Singh, S.K., Singh, R., Kumar, S.: Efficient loop unrolling factor prediction algorithm using machine learning models. In: 2022 3rd International Conference for Emerging Technology (INCET), pp. 1–8 (2022). https://doi.org/10.1109/INCET54531.2022.9825092

  32. Aggarwal, K., Singh, S.K., Chopra, M., Kumar, S., Colace, F.: Deep learning in robotics for strengthening industry 4.0.: opportunities, challenges and future directions. In: Nedjah, N., Abd El-Latif, A.A., Gupta, B.B., Mourelle, L.M. (eds.) Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. Studies (2022)

    Google Scholar 

  33. Singh, S.K., Singh, R.K., Bhatia, M.: Design flow of reconfigurable embedded system architecture using LUTs/PLAs. In: 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 385–390 (2012). https://doi.org/10.1109/PDGC.2012.6449851

  34. Gupta, S., Singh, S.K., Jain, R: Analysis and optimisation of various transmission issues in video streaming over Bluetooth . Int. J. Comput. Appl. 11(7), 44–48 9 (2010)

    Google Scholar 

  35. Chopra, M., et al.: Analysis and prognosis of sustainable development goals using big data-based approach during COVID-19 pandemic. Sustain. Technol. Entrepreneurship. www.sciencedirect.com/science/article/pii/S2773032822000128 (2022)

  36. Sharma, S.K., Singh, S.K., Panja, S.C.: Human factors of vehicle automation. Auton. Driving Adv. Driver-Assistance Syst. (ADAS), 335–358 6 (2021)

    Google Scholar 

  37. Singh, R., Rana, R., Singh, S.K.: Performance evaluation of VGG models in detection of wheat rust. Asian J. Comput. Sci. Technol. 7(3), 76–81 5 (2018)

    Google Scholar 

  38. Ghosh, Security and Privacy for E-Business

    Google Scholar 

  39. Singh, S.K., Singh, R.K., Bhatia, M.P.S., Singh, S.P.: CAD for delay optimization of symmetrical FPGA architecture through hybrid LUTs/PLAs (2013)

    Google Scholar 

  40. Meghanathan, N., Nagamalai, D., Chaki, N. (eds.): Advances in Computing and Information Technology. In: Advances in Intelligent Systems and Computing, vol. 178. Springer, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31600-5_57

  41. Kaur, P., Singh, S.K., Singh, I., Kumar, S.: Exploring convolutional neural network in computer vision based image classification. https://ceur-ws.org/Vol-3080/21.pdf (2022)

  42. Tsai, C., Chen, C., Zhuang, D.: Secure OTP and biometric verification scheme for mobile banking. In: 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, pp. 138–141 (2012). https://doi.org/10.1109/MUSIC.2012.31

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akash Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, A., Singh, S.K., Kumar, S., Chhabra, A., Gupta, S. (2023). Security of Android Banking Mobile Apps: Challenges and Opportunities. In: Nedjah, N., Martínez Pérez, G., Gupta, B.B. (eds) International Conference on Cyber Security, Privacy and Networking (ICSPN 2022). ICSPN 2021. Lecture Notes in Networks and Systems, vol 599. Springer, Cham. https://doi.org/10.1007/978-3-031-22018-0_39

Download citation

Publish with us

Policies and ethics