Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Case study of the vulnerability of OTP implemented in internet banking systems of South Korea

Authors Info & Claims
Published:01 May 2015Publication History
Skip Abstract Section

Abstract

The security risk of internet banking has increased rapidly as internet banking services have become commonly used by the public. Among the various security methods, OTP (one time password) is known as one of the strongest methods for enforcing security, and it is now widely used in internet banking services. However, attack methods which can detour OTP have been developed that additional security for OTP is now needed. In this study, we discovered that a new kind of attack through OTP is theoretically possible through an analysis of the currently implemented OTP system and known attack methods. Based on our theory, we tested the new attack method on Korean internet banking services, and empirically proved that it could effectively detour around all of the currently implemented OTP security systems in Korea. To prevent this, we also suggested solutions based on the root cause analysis of the OTP vulnerabilities.

References

  1. (2008) NetworkWorld, New Trojan intercepts online banking information, http://www.networkworld.com/news/2008/011408-silentbanker-trojan.htmlGoogle ScholarGoogle Scholar
  2. (2014) Gi Seong Lee, Huy Kang Kim, "Internet Banking Security Services in South Korea, the status quo", http://www.hksecurity.net/internet-banking-in-south-koreaGoogle ScholarGoogle Scholar
  3. Aloul F, Zahidi S, Wassim E-H (2009) Two factor authentication using mobile phones. IEEE/ACS International Conference on Computer Systems and Applications, pp 641---644Google ScholarGoogle Scholar
  4. Bae G, Lim G (2008) Analysis of basic weakness of keyboard security solution, Korea Institute of Information Security Cryptology, No.3, Vol. 18, pp 89---95Google ScholarGoogle Scholar
  5. BBC News, South Korea blames North for bank and TV cyber-attacks, http://www.bbc.co.uk/news/technology-22092051Google ScholarGoogle Scholar
  6. Chang H (2011) The study on end-to-end security for ubiquitous commerce. J Supercomput 55(2):228---245 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Christos K (2007) Dimitriadis, analyzing the security of internet banking authentication mechanisms. Inf Syst Control J 3:1---8Google ScholarGoogle Scholar
  8. Citibank Phish Spoofs 2-Factor Authentication, http://blog.washingtonpost.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.htmlGoogle ScholarGoogle Scholar
  9. Considerations for web transaction security, RFC2084, http://www.ietf.org/rfc/rfc2084.txtGoogle ScholarGoogle Scholar
  10. Cornel de Jong, Online authentication methods, evaluate the strength of online authentication methods, http://staff.science.uva.nl/~delaat/rp/2007-2008/p30/report.pdfGoogle ScholarGoogle Scholar
  11. Guhring P (2007) Concepts against man-in-the-browser attacksGoogle ScholarGoogle Scholar
  12. Hallsteinsen S, Jorstad I, Thanh D (2007) Using the mobile phone as s security token for unified authentication. In: ICSNC 2007. IEEE Computer Society, Los Alamitos pp 68 Google ScholarGoogle Scholar
  13. Hanacek P, Malinka K, Schafer J (2009) E-Banking Security--Comparative Study, 10th ACIS, pp 263---26Google ScholarGoogle Scholar
  14. Hiltgen A, Kramp T, Weigold T (2006) Secure Internet Banking Authentication, IEEE Security & Privacy Google ScholarGoogle Scholar
  15. Ku WC, Tasi HC, Tsaur MJ (2005) Stolen-verifier attack on an efficient smartcard-based one-time password authentication scheme. IEICE Trans Commun E87-B(8):2374---2376Google ScholarGoogle Scholar
  16. Maeng Y, Shin D, Kim S, Yang D, Lee M (2010) Analysis of weakness of MITB against credit transfer of domestic internet banking, Internet and Information Security, No.2, Vol.1, pp 101---118Google ScholarGoogle Scholar
  17. Mizuno S, Yamada K, Takahashi K (2005) Authentication using multiple communication channels, in DIM 2005: Proceedings of the 2005 workshop on Digital identity management. New York, NY, USA: ACM, pp 54---62 Google ScholarGoogle Scholar
  18. Oppliger R, Rytz R, Holderegger T (2009) eSecurity Technol, Internet Banking: Client-Side Attacks and Protection Mechanisms, IEEE, Computer, pp 27---33 Google ScholarGoogle Scholar
  19. Paulson LD (2002) Key snooping technology causes controversy, IEEE, Computer, pp 27Google ScholarGoogle Scholar
  20. Phishing attack targets one-time passwords--scratch it and weep, http://www.theregister.co.uk/2005/10/12/outlaw_phishing/Google ScholarGoogle Scholar
  21. Phone approval service, http://bank1.kbstar.com/quics?asfilecode=5023&_nextPage=page=B002346Google ScholarGoogle Scholar
  22. Security aspects of the SuisseID - http://postsuisseid.ch/en/suisseid/security/security-aspectsGoogle ScholarGoogle Scholar
  23. Seo S, Kang W, (2007) Technical status of OTP & cases of introducing OTP in domestic financial institutions, Korea Institute of Information Security Cryptology, No.3, Vol. 17, pp 18---25Google ScholarGoogle Scholar
  24. Sherstobitoff R, Liba I, Walter J (2013) Dissecting Operation Troy: Cyberespionage in South Korea, http://www.mcafee.com/au/resources/white-papers/wp-dissecting-operation-troy.pdfGoogle ScholarGoogle Scholar
  25. Steeves DJ, Snyder MW (2005) Secure online transaction using a CAPTCHA image as a watermark, U.S.Patent, 11/157,336Google ScholarGoogle Scholar
  26. Thanh D, Jonvik T, Feng B, Thuan D, Jorstad I (2008) Simple strong authentication for internet applications using mobile phones. IEEE GLOBECOM pp 1---5Google ScholarGoogle Scholar
  27. UOTP, http://www.u-otp.co.kr/blog/Google ScholarGoogle Scholar
  28. Wikipedia.: Man-in-the-middle Attack, http://en.wikipedia.org/wiki/Man_in_the_middle_attackGoogle ScholarGoogle Scholar
  29. Wikipedia.: One-Time Password, http://en.wikipedia.org/wiki/One-time_passwordGoogle ScholarGoogle Scholar
  30. Wikipedia.: Online Banking, http://en.wikipedia.org/wiki/Online_bankingGoogle ScholarGoogle Scholar
  31. Wikipedia.: Two-factor Authentication, http://en.wikipidia.org/wiki/two-factor_authenticationGoogle ScholarGoogle Scholar

Index Terms

  1. Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access