Mostrar el registro sencillo del ítem

dc.contributor.authorAparicio de la Fuente, Amador
dc.contributor.authorMartínez González, María Mercedes 
dc.contributor.authorCardeñoso Payo, Valentín 
dc.date.accessioned2023-08-18T08:17:32Z
dc.date.available2023-08-18T08:17:32Z
dc.date.issued2023
dc.identifier.citationWireless Networks, 2023.es
dc.identifier.issn1022-0038es
dc.identifier.urihttps://uvadoc.uva.es/handle/10324/60698
dc.descriptionProducción Científicaes
dc.description.abstractTwo Factor Authentication (2FA) using One Time Password (OTP) codes via SMS messages is widely used. In order to improve user experience, Google has proposed APIs that allow the automatic verification of the SMS messages without the intervention of the users themselves. They reduce the risks of user error, but they also have vulnerabilities. One of these APIs is the SMS Retriever API for Android devices. This article presents a method to study the vulnerabilities of these OTP exchange APIs in a given sector. The most popular API in the sector is selected, and different scenarios of interaction between mobile apps and SMS OTP servers are posed to determine which implementations are vulnerable. The proposed methodology, applied here to the banking sector, is nevertheless simple enough to be applied to any other sector, or to other SMS OTP APIs. One of its advantages is that it proposes a method for detecting bad implementations on the server side, based on analyses of the apps, which boosts reusability and replicability, while offering a guide to developers to prevent errors that cause vulnerabilities. Our study focuses on Spain’s banking sector, in which the SMS Retriever API is the most popular. The results suggest that there are vulnerable implementations which would allow cybercriminals to steal the users SMS OTP codes. This suggests that a revision of the equilibrium between ease of use and security would apply in order to maintain the high level of security which has traditionally characterized this sector.es
dc.format.mimetypeapplication/pdfes
dc.language.isoenges
dc.publisherSpringeres
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subject.classificationAndroides
dc.subject.classificationSecurityes
dc.subject.classificationBankinges
dc.subject.classificationAppses
dc.titleApp-based detection of vulnerable implementations of OTP SMS APIs in the banking sectores
dc.typeinfo:eu-repo/semantics/articlees
dc.rights.holder© 2023 The Author(s)es
dc.identifier.doi10.1007/s11276-023-03455-wes
dc.relation.publisherversionhttps://link.springer.com/article/10.1007/s11276-023-03455-wes
dc.identifier.publicationtitleWireless Networkses
dc.peerreviewedSIes
dc.description.projectPublicación en abierto financiada por el Consorcio de Bibliotecas Universitarias de Castilla y León (BUCLE), con cargo al Programa Operativo 2014ES16RFOP009 FEDER 2014-2020 DE CASTILLA Y LEÓN, Actuación:20007-CL - Apoyo Consorcio BUCLEes
dc.identifier.essn1572-8196es
dc.rightsAtribución 4.0 Internacional*
dc.type.hasVersioninfo:eu-repo/semantics/publishedVersiones
dc.subject.unesco1203.17 Informáticaes


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem