Abstract
The security risk of internet banking has increased rapidly as internet banking services have become commonly used by the public. Among the various security methods, OTP (one time password) is known as one of the strongest methods for enforcing security, and it is now widely used in internet banking services. However, attack methods which can detour OTP have been developed that additional security for OTP is now needed. In this study, we discovered that a new kind of attack through OTP is theoretically possible through an analysis of the currently implemented OTP system and known attack methods. Based on our theory, we tested the new attack method on Korean internet banking services, and empirically proved that it could effectively detour around all of the currently implemented OTP security systems in Korea. To prevent this, we also suggested solutions based on the root cause analysis of the OTP vulnerabilities.
Original language | English |
---|---|
Pages (from-to) | 3289-3303 |
Number of pages | 15 |
Journal | Multimedia Tools and Applications |
Volume | 74 |
Issue number | 10 |
DOIs | |
Publication status | Published - 2015 May 16 |
Bibliographical note
Funding Information:This work was supported by a grant from the Kyung Hee University in 2013 (KHU-2013-0988).
Publisher Copyright:
© 2014, Springer Science+Business Media New York.
Keywords
- Internet banking
- Man-in-the-middle attack
- OTP (one time password)
- Reverse engineering
ASJC Scopus subject areas
- Software
- Media Technology
- Hardware and Architecture
- Computer Networks and Communications