Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications
Abstract
:1. Introduction
2. Background and Related Work
2.1. Mobile Application Vulnerability Analysis
2.2. Mobile Security Threats
2.3. Related Work
3. Materials and Methods
3.1. Sample Selection
3.2. Vulnerability Analysis and Data Collection
3.3. Data Analysis and Vulnerability Classification
4. Results and Discussion
4.1. Overall Vulnerability Assessment
4.2. Comparison between Thai and Non-Thai Banks
4.3. Effectiveness of Vulnerability Assessment Tools
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Bank of Thailand Use of Mobile Banking and Internet Banking. Available online: https://app.bot.or.th/BTWS_STAT/statistics/BOTWEBSTAT.aspx?reportID=949&language=ENG (accessed on 20 July 2024).
- StatCounter Global Stats Mobile Operating System Market Share Thailand. Available online: https://gs.statcounter.com/os-market-share/mobile/thailand (accessed on 20 July 2024).
- Bhatnagar, S.; Malik, Y.; Butakov, S. Analysing Data Security Requirements of Android Mobile Banking Application. In Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, Vancouver, BC, Canada, 28–30 November 2018; Traore, I., Woungang, I., Ahmed, S.S., Malik, Y., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 30–37. [Google Scholar]
- Chen, S.; Fan, L.; Meng, G.; Su, T.; Xue, M.; Xue, Y.; Liu, Y.; Xu, L. An Empirical Assessment of Security Risks of Global Android Banking Apps. In Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering, Seoul, Republic of Korea, 27 June–19 July 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1310–1322. [Google Scholar]
- Kouraogo, Y.; Zkik, K.; Idrissi, N.E.J.E.; Orhanou, G. Security Model on Mobile Banking Application: Attack Simulation and Countermeasures. Int. J. Intell. Enterp. 2017, 4, 155. [Google Scholar] [CrossRef]
- OWASP. OWASP Mobile Top 10|OWASP Foundation. Available online: https://owasp.org/www-project-mobile-top-10/ (accessed on 20 July 2024).
- Bassolé, D.; Koala, G.; Traoré, Y.; Sié, O. Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries. In Innovations and Interdisciplinary Solutions for Underserved Areas; Thorn, J.P.R., Gueye, A., Hejnowicz, A.P., Eds.; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer International Publishing: Cham, Switzerland, 2020; Volume 321, pp. 164–175. ISBN 978-3-030-51050-3. [Google Scholar]
- Tangari, G.; Ikram, M.; Sentana, I.W.B.; Ijaz, K.; Kaafar, M.A.; Berkovsky, S. Analyzing Security Issues of Android Mobile Health and Medical Applications. J. Am. Med. Inform. Assoc. 2021, 28, 2074–2084. [Google Scholar] [CrossRef] [PubMed]
- Kouliaridis, V.; Karopoulos, G.; Kambourakis, G. Assessing the Security and Privacy of Android Official ID Wallet Apps. Information 2023, 14, 457. [Google Scholar] [CrossRef]
- Li, J. Vulnerabilities Mapping Based on OWASP-SANS: A Survey for Static Application Security Testing (SAST). Ann. Emerg. Technol. Comput. (AETiC) 2020, 4, 1–8. [Google Scholar] [CrossRef]
- Darvish, H.; Husain, M. Security Analysis of Mobile Money Applications on Android. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 3072–3078. [Google Scholar]
- Montealegre, C.; Njuguna, C.R.; Malik, M.I.; Hannay, P.; McAteer, I.N. Security Vulnerabilities in Android Applications. In Proceedings of the Australian Information Security Management Conference, Perth, Australia, 5–6 December 2018. [Google Scholar] [CrossRef]
- Falade, P.; Ogundele, G. Vulnerability Analysis of Digital Banks’ Mobile Applications. arXiv 2023, arXiv:2302.07586. [Google Scholar] [CrossRef]
- Kishnani, U.; Noah, N.; Das, S.; Dewri, R. Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications. In Proceedings of the 2023 European Symposium on Usable Security, Copenhagen, Denmark, 16–17 October 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 143–157. [Google Scholar]
- Al-Delayel, S.A. Security Analysis of Mobile Banking Application in Qatar. arXiv 2023, arXiv:2202.00582. [Google Scholar] [CrossRef]
- Basavala, S.R.; Kumar, N.; Aggarwal, A. Mobile Applications—Vulnerability Assessment Through the Static and Dynamic Analysis; Atlantis Press: Amsterdam, The Netherlands, 2013; pp. 673–679. [Google Scholar]
- Chattopadhyay, A.; Sripada, D. Security Analysis and Threat Modelling of Mobile Banking Applications. In Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–6. [Google Scholar]
Category | Threat | Description |
---|---|---|
M1 | Improper Platform Usage | Misuse of a platform (Android, in this case) feature and failure to use security controls provided by the platform. |
M2 | Insecure Data Storage | Sensitive data such as passwords or financial information stored on the device without proper encryption is vulnerable to theft and leakage. |
M3 | Insecure Communication | Unencrypted data transmission over public networks allows attackers to intercept sensitive information. |
M4 | Insecure Authentication | Flawed mechanisms for user verification and access control can leave user data exposed. |
M5 | Insufficient Cryptography | Weak encryption algorithms or improper key management practices can leave data related to users and applications vulnerable to decryption. |
M6 | Insecure Authorisation | Inadequate verification and validation of identity and permission of a user in the application. |
M7 | Client Code Quality | Low quality and insecurity of the code that runs directly on a mobile device, making the code potentially exploitable. |
M8 | Code Tampering | Unauthorised modification of the application’s code to alter its behaviour, which can result in malicious functions being introduced. |
M9 | Reverse Engineering | Lack of mechanisms to protect the application’s code from reverse engineering can expose vulnerabilities. |
M10 | Extraneous Functionality | Presence of any code or feature within the application that serves no purpose and can potentially expose the application to security risks. |
Application | Version | Size (MB) | Class | Asset (Million USD) |
---|---|---|---|---|
Bank A | 2.25.0 | 82.39 | National | 85,462 |
Bank B | 5.19.0 | 127.00 | National | 110,935 |
Bank C | 14.6.7 | 179.00 | National | 99,303 |
Bank D | 3.34.1 | 103.00 | National | 116,384 |
Bank E | 3.80.0 | 274.00 | National | 93,561 |
OWASP Category | Thai Bank | Non-Thai Bank | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Bank A | Bank B | Bank C | Bank D | Bank E | Chinese Bank | Indian Bank | Singaporean Bank | Korean Bank | |||||||||||||||||||
1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | 1 | 2 | 3 | |
M1 | √ | - | √ | - | - | √ | √ | - | √ | - | - | √ | - | - | √ | √ | - | √ | √ | - | √ | - | - | √ | - | - | √ |
M2 | √ | - | - | - | - | - | √ | - | - | - | - | - | - | - | - | - | - | - | √ | - | - | √ | - | - | - | - | - |
M3 | - | √ | √ | √ | - | √ | - | √ | √ | √ | - | √ | - | - | - | - | - | - | √ | √ | √ | √ | - | - | √ | - | √ |
M4 | √ | √ | √ | - | √ | √ | √ | - | √ | √ | - | √ | √ | - | √ | - | - | - | √ | - | √ | √ | √ | - | - | √ | √ |
M5 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | - | √ | √ | - | √ | - | - | - | √ | √ | √ | - | √ | - | √ | √ | √ |
M6 | - | - | √ | - | - | √ | - | - | √ | √ | - | √ | √ | - | - | - | - | - | √ | - | √ | √ | - | - | √ | - | √ |
M7 | √ | √ | - | - | √ | - | √ | - | - | - | √ | - | - | √ | - | - | - | - | √ | - | - | √ | √ | - | √ | √ | - |
M8 | √ | √ | - | √ | √ | √ | √ | - | √ | √ | √ | √ | √ | - | √ | √ | - | √ | √ | - | √ | √ | √ | √ | √ | √ | √ |
M9 | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | - | - | √ | - | √ | √ | √ | √ | - | √ | √ | √ |
M10 | √ | √ | √ | √ | √ | √ | √ | √ | - | √ | √ | - | √ | √ | √ | - | - | - | - | √ | √ | - | √ | - | - | √ | √ |
Vulnerability | Occurrence (%) | 95% Confidence Interval (CI) |
---|---|---|
M9 | 85.2 | [66.3, 95.8] |
M8 | 77.8 | [57.7, 91.4] |
M5 | 74.1 | [53.7, 88.9] |
M10 | 70.4 | [49.8, 86.2] |
M4 | 63.0 | [42.4, 80.6] |
M1 | 59.3 | [38.8, 77.6] |
M3 | 44.4 | [25.5, 64.7] |
M6 | 40.7 | [22.4, 61.2] |
M7 | 33.3 | [16.5, 54.0] |
M2 | 14.8 | [4.2, 33.7] |
Metric | Thai Banks | Non-Thai Banks | t-Value | p-Value |
---|---|---|---|---|
Mean Total | 22.80 | 14.25 | 2.35 | 0.041 |
Vulnerabilities | (S.D. = 3.42) | (S.D. = 10.21) |
Vulnerability | Thai Banking Applications | Non-Thai Banking Applications |
---|---|---|
M1 | 3.8 | 2.5 |
M2 | 1.2 | 0.5 |
M3 | 2.6 | 1.75 |
M4 | 4.0 | 2.25 |
M5 | 4.4 | 2.5 |
M6 | 2.4 | 1.75 |
M7 | 2.4 | 1.25 |
M8 | 4.2 | 3.25 |
M9 | 5.0 | 2.75 |
M10 | 4.6 | 2.0 |
Tool | Raw Vulnerability Counts | Mean Vulnerabilities Detected per Application | S.D. |
---|---|---|---|
AndroBugs | 66 | 7.33 | 3.20 |
QARK | 64 | 7.11 | 3.06 |
MobSF | 39 | 4.33 | 2.65 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Titiakarawongse, C.; Taksin, S.; Ruangsawat, J.; Deeduangpan, K.; Boonkrong, S. Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications. J. Cybersecur. Priv. 2024, 4, 650-662. https://doi.org/10.3390/jcp4030031
Titiakarawongse C, Taksin S, Ruangsawat J, Deeduangpan K, Boonkrong S. Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications. Journal of Cybersecurity and Privacy. 2024; 4(3):650-662. https://doi.org/10.3390/jcp4030031
Chicago/Turabian StyleTitiakarawongse, Chatphat, Sasiyaporn Taksin, Jidapa Ruangsawat, Kunthida Deeduangpan, and Sirapat Boonkrong. 2024. "Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications" Journal of Cybersecurity and Privacy 4, no. 3: 650-662. https://doi.org/10.3390/jcp4030031
APA StyleTitiakarawongse, C., Taksin, S., Ruangsawat, J., Deeduangpan, K., & Boonkrong, S. (2024). Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications. Journal of Cybersecurity and Privacy, 4(3), 650-662. https://doi.org/10.3390/jcp4030031