Personal information leaks with automatic login in mobile social network services

9Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

To log in to a mobile social network service (SNS) server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on the server based on the user's ID and password. This security token is called a credential. Because such credentials are convenient for users, they are utilized by most mobile SNS apps. However, the current state of credential management for the majority of Android SNS apps is very weak. This paper demonstrates the possibility of a credential cloning attack. Such attacks occur when an attacker extracts the credential from the victim's smart device and inserts it into their own smart device. Then, without knowing the victim's ID and password, the attacker can access the victim's account. This type of attack gives access to various pieces of personal information without authorization. Thus, in this paper, we analyze the vulnerabilities of the main Android-based SNS apps to credential cloning attacks, and examine the potential leakage of personal information that may result. We then introduce effective countermeasures to resolve these problems.

Cite

CITATION STYLE

APA

Choi, J., Cho, H., & Yi, J. H. (2015). Personal information leaks with automatic login in mobile social network services. Entropy, 17(6), 3947–3962. https://doi.org/10.3390/e17063947

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free