Title | An Empirical Assessment of Security Risks of Global Android Banking Apps |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Chen, Sen, Fan, Lingling, Meng, Guozhu, Su, Ting, Xue, Minhui, Xue, Yinxing, Liu, Yang, Xu, Lihua |
Conference Name | 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) |
Date Published | June 2020 |
Publisher | ACM |
Keywords | Automated Secure Software Engineering, Banking, Companies, composability, empirical study, Mobile Banking Apps, pubcrawl, resilience, Resiliency, risk management, security, software engineering, Stakeholders, Tools, Vulnerability, weakness |
Abstract | Mobile banking apps, belonging to the most security-critical app category, render massive and dynamic transactions susceptible to security risks. Given huge potential financial loss caused by vulnerabilities, existing research lacks a comprehensive empirical study on the security risks of global banking apps to provide useful insights and improve the security of banking apps. Since data-related weaknesses in banking apps are critical and may directly cause serious financial loss, this paper first revisits the state-of-the-art available tools and finds that they have limited capability in identifying data-related security weaknesses of banking apps. To complement the capability of existing tools in data-related weakness detection, we propose a three-phase automated security risk assessment system, named Ausera, which leverages static program analysis techniques and sensitive keyword identification. By leveraging Ausera, we collect 2,157 weaknesses in 693 real-world banking apps across 83 countries, which we use as a basis to conduct a comprehensive empirical study from different aspects, such as global distribution and weakness evolution during version updates. We find that apps owned by subsidiary banks are always less secure than or equivalent to those owned by parent banks. In addition, we also track the patching of weaknesses and receive much positive feedback from banking entities so as to improve the security of banking apps in practice. We further find that weaknesses derived from outdated versions of banking apps or third-party libraries are highly prone to being exploited by attackers. To date, we highlight that 21 banks have confirmed the weaknesses we reported (including 126 weaknesses in total). We also exchange insights with 7 banks, such as HSBC in UK and OCBC in Singapore, via in-person or online meetings to help them improve their apps. We hope that the insights developed in this paper will inform the communities about the gaps among multiple stakeholders, including banks, academic researchers, and third-party security companies. |
URL | https://dl.acm.org/doi/abs/10.1145/3377811.3380417 |
DOI | https://doi.org/10.1145/3377811.3380417 |
Citation Key | chen_empirical_2020 |