Security Analysis of Mobile Banking Application in Qatar

This paper discusses the security posture of Android m-banking applications in Qatar. Since technology has developed over the years and more security methods are provided, banking is now heavily reliant on mobile applications for prompt service delivery to clients, thus enabling a seamless and remote transaction. However, such mobile banking applications have access to sensitive data for each bank customer which presents a potential attack vector for clients, and the banks. The banks, therefore, have the responsibility to protect the information of the client by providing a high-security layer to their mobile application. This research discusses m-banking applications for Android OS, its security, vulnerability, threats, and solutions. Two m-banking applications were analyzed and benchmarked against standardized best practices, using the combination of two mobile testing frameworks. The security weaknesses observed during the experimental evaluation suggest the need for a more robust security evaluation of a mobile banking application in the state of Qatar. Such an approach would further ensure the confidence of the end-users. Consequently, understanding the security posture would provide a veritable measure towards mbanking security and user awareness.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/15/2023

Vulnerability Analysis of Digital Banks' Mobile Applications

There is a rapid increase in the number of mobile banking applications' ...
research
01/24/2018

Knock-Knock: The unbearable lightness of Android Notifications

Android Notifications can be considered as essential parts in Human-Smar...
research
02/23/2022

BYOD Security: A Study of Human Dimensions

The prevalence and maturity of Bring Your Own Device (BYOD) security alo...
research
09/04/2017

Automation of Android Applications Testing Using Machine Learning Activities Classification

Mobile applications are being used every day by more than half of the wo...
research
08/11/2018

Attacks Against BLE Devices by Co-located Mobile Applications

Bluetooth Low Energy (BLE) is a fast-growing wireless technology with a ...
research
09/06/2021

Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

With the Increasing use of Machine Learning in Android applications, mor...
research
09/01/2023

The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania

Digital financial services have catalyzed financial inclusion in Africa....

Please sign up or login with your details

Forgot password? Click here to reset