Preview

Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications

Powerful Essays
Open Document
Open Document
5403 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications
Guess Who’s Texting You?
Evaluating the Security of Smartphone Messaging Applications
Sebastian Schrittwieser, Peter Fr¨ hwirt, Peter Kieseberg, Manuel Leithner, u Martin Mulazzani, Markus Huber, Edgar Weippl
SBA Research gGmbH
Vienna, Austria
(1stletterfirstname)(lastname)@sba-research.org

Abstract
In recent months a new generation of mobile messaging and VoIP applications for smartphones was introduced.
These services offer free calls and text messages to other subscribers, providing an Internet-based alternative to the traditional communication methods managed by cellular network carriers such as SMS, MMS and voice calls. While user numbers are estimated in the millions, very little attention has so far been paid to the security measures (or lack thereof) implemented by these providers.
In this paper we analyze nine popular mobile messaging and VoIP applications and evaluate their security models with a focus on authentication mechanisms. We find that a majority of the examined applications use the user’s phone number as a unique token to identify accounts, which further encumbers the implementation of security barriers. Finally, experimental results show that major security flaws exist in most of the tested applications, allowing attackers to hijack accounts, spoof sender-IDs or enumerate subscribers.

1

been the subject of an ample amount of past research.
The common advantages of the tools we examined lie in very simple and fast setup routines combined with the possibility to incorporate existing on-device address books. Additionally these services offer communication free of charge and thus pose a low entry barrier to potential customers.
However, we find that the very design of most of these messaging systems thwarts their security measures, leading to issues such as the possibility for communication without proper sender authentication.
The main contribution of our paper is an evaluation of the security of mobile messaging



References: user profiling. In Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings, volume 6307, page 422 [2] M. Bishop. Computer Security: Art and Science. AddisonWesley, 2002. [3] L. Davi, A. Dmitrienko, A. Sadeghi, and M. Winandy. Privilege escalation attacks on android. Information Security, pages 346–360, 2011. Information Theory, IEEE Transactions on, 22(6):644–654, 1976. [5] M. Egele, C. Kruegel, E. Kirda, and G. Vigna. Pios: Detecting privacy leaks in ios applications. In Network and Distributed System Security Symposium (NDSS), 2011. USENIX Security Symposium, 2011. [9] W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. Security & Privacy, IEEE, 7(1):50–57, 2009. CA, 2011. Intrepidus group, 2011. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems (TOCS), 10(4):265–310, 1992. [14] M. Marlinspike. Website of sslsniff tool, 2011. [Online; retrieved Jun 21st, 2011], Online at http://www. 32(9):33–38, 1994. [17] Whisper Systems. Whisper systems, 2011. [Online; retrieved Aug 21st, 2011], http://www.whispersys. [18] A. Whitten and J. Tygar. Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages 169–184, 1999. [19] XMPP Foundation. XMPP Standard, 2011. [Online; retrieved Jun 21st, 2011], http://xmpp.org/l.

You May Also Find These Documents Helpful

  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Security Breach at Tjx

    • 755 Words
    • 4 Pages

    business issue and not just a technology issue. As seen by the attack, an IT security…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Message to Garcia

    • 339 Words
    • 1 Page

    I think that it is about the scarcity of and high demand for certain valuable qualities of character. A quality such as; taking on a difficult task and doing whatever it takes to get it done, without having to ask lots of questions on how to solve the problem at hand. It also means in the face of adversity, find a way to get results to get the job done. Rowan set out to do what he was asked to do and he did it. There were no excuses or foot-dragging. He didn't demand that someone give him more detailed plans of how to accomplish this assignment. He didn't hesitate. He didn't waste time. He didn't give up, although there were plenty of temptations to do so. He stayed focused on his goal.…

    • 339 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Power, Richard, 1999 CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Volume XV, Number 2, 1999, pp. 32.…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays