SMS-based one-time passwords: Attacks and defense (short paper)

N/ACitations
Citations of this article
75Readers
Mendeley users who have this article in their library.
Get full text

Abstract

SMS-based One-Time Passwords (SMS OTP) were introduced to counter phishing and other attacks against Internet services such as online banking. Today, SMS OTPs are commonly used for authentication and authorization for many different applications. Recently, SMS OTPs have come under heavy attack, especially by smartphone Trojans. In this paper, we analyze the security architecture of SMS OTP systems and study attacks that pose a threat to Internet-based authentication and authorization services. We determined that the two foundations SMS OTP is built on, cellular networks and mobile handsets, were completely different at the time when SMS OTP was designed and introduced. Throughout this work, we show why SMS OTP systems cannot be considered secure anymore. Based on our findings, we propose mechanisms to secure SMS OTPs against common attacks and specifically against smartphone Trojans. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Mulliner, C., Borgaonkar, R., Stewin, P., & Seifert, J. P. (2013). SMS-based one-time passwords: Attacks and defense (short paper). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7967 LNCS, pp. 150–159). https://doi.org/10.1007/978-3-642-39235-1_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free