Hardened client platforms for secure internet banking

4Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We review the security of c-banking platforms with particular attention to the exploitable attack vectors of three main attack categories: Man-in-the-Middle, Man-in-the-PC and Man-in-the-Browser. It will be shown that the most serious threats come from combination attacks capable of hacking any transaction without the need to control the authentication process. Using this approach, the security of any authentication system can be bypassed, including those using SecureID Tokens, OTP Tokens, Biometric Sensors and Smart Cards. We will describe and compare two recently proposed c-banking platforms, the ZTIC and the USPD, both of which are based on the use of dedicated client devices, but with diverging approaches with respect to the need of hardening the Web client application. It will be shown that the use of a Hardened Browser (or H-Browser) component is critical to force attackers to employ complex and expensive techniques and to reduce the strength and variety of social engineering attacks down to physiological fraud levels. © 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden.

Cite

CITATION STYLE

APA

Ronchi, C., & Zakhidov, S. (2009). Hardened client platforms for secure internet banking. In ISSE 2008 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference (pp. 367–379). https://doi.org/10.1007/978-3-8348-9283-6_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free