Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Mobile Forensics Development of Mobile Banking Application using Static Forensic

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Adam Prayogo Kuncoro, Imam Riadi, Ahmad Luthfi
10.5120/ijca2017912925

Adam Prayogo Kuncoro, Imam Riadi and Ahmad Luthfi. Mobile Forensics Development of Mobile Banking Application using Static Forensic. International Journal of Computer Applications 160(1):5-10, February 2017. BibTeX

@article{10.5120/ijca2017912925,
	author = {Adam Prayogo Kuncoro and Imam Riadi and Ahmad Luthfi},
	title = {Mobile Forensics Development of Mobile Banking Application using Static Forensic},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {1},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {5-10},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume160/number1/27035-2017912925},
	doi = {10.5120/ijca2017912925},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Modern society often conducts transactions through the banking system in many purposes. Suppose transfers between accounts or between banks, monthly subscription payments, and so forth. To facilitate such transactions, many banks provide a service to customers in the form of mobile banking applications. But the increasingly sophisticated technology used in providing the service, the greater the threat of cybercrime in the world around customers. By way of forensic analysis forensic data with the static method expected to obtain important information or data that can be used as digital evidence. Suppose the access log, transaction records, customer profiles, and so on. Because the important information that can be misused as a security loophole to carry out illegal access. This study focused on the analysis of the log data mobile banking application, expected results reached 80%. After testing and analysis of the mobile banking application, there is no important information that can be used for unauthorized access. And the security level applied modern enough to secure from unauthorized access action.

References

  1. I.Advances and C. Technology, “Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices,” no. April 2013, 2016.
  2. A. Hussain, H. I. Abubakar, and N. B. Hashim, “Evaluating mobile banking application: Usability dimensions and measurements,” Conf. Proc. - 6th Int. Conf. Inf. Technol. Multimed. UNITEN Cultiv. Creat. Enabling Technol. Through Internet Things, ICIMU 2014, no. 1, pp. 136–140, 2015.
  3. M. Purwanegara, A. Apriningsih, and F. Andika, “Snapshot on Indonesia Regulation in Mobile Internet Banking Users Attitudes,” Procedia -Social Behav. Sci., vol. 115, no. Iicies 2013, pp. 147–155, 2014.
  4. T. Cho, Y. Kim, and S. Han, “Potential Vulnerability Analysis of Mobile Banking Applications,” no. 2012, pp. 1114–1115, 2013.
  5. L. Nosrati, “Security assessment of Mobile- Banking,” pp. 1--5, 2015.
  6. C. Narendiran, S. A. Rabara, and N. Rajendran, “Public key infrastructure for mobile banking security,” 2009 Glob. Mob. Congr., pp. 1–6, 2009.
  7. S. Bojjagani and V. N. Sastry, “SSMBP: A secure SMS-based mobile banking protocol with formal verification,” 2015 IEEE 11th Int. Conf. Wirel. Mob. Comput. Netw. Commun. WiMob 2015, pp. 252–259, 2015.
  8. S. Hadi and U. I. Indonesia, “Faktor-Faktor Yang Mempengaruhi Penggunaan,” pp. 55–67.
  9. M. Epifani, S. European, and D. Forensics, “Open Source Tools for Mobile Forensics,” no. October, 2013.
  10. Y. Wang and Y. Alshboul, “Mobile security testing approaches and challenges,” 2015 First Conf. Mob. Secur. Serv., pp. 1–5, 2015.
  11. S. Mrdovic, A. Huseinovic, and E. Zajko, “Combining static and live digital forensic analysis in virtual environment,” IEEE Int. Symp. Information, Commun. Autom. Technol., pp. 1–6, 2009.
  12. Z. Qian, D. Luo, and S. Wu, “Analysis and design of a mobile forensic software system based on AT commands,” 2008 IEEE Int. Symp. Knowl. Acquis. Model. Work. Proceedings, KAM 2008, no. 60704042, pp. 597–600, 2008.

Keywords

Mobile Banking, Mobile Forensics, Log, Security