A Security Analysis of Password Managers on Android

被引:1
|
作者
Sharma, Abhyudaya [1 ]
Mishra, Sweta [1 ]
机构
[1] Shiv Nadar Univ, Greater Noida, India
来源
关键词
password manager; android; security; reverse engineering;
D O I
10.1007/978-3-031-49099-6_1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Password Managers are software tools designed to help users easily store and access credentials across devices while also reducing, if not eliminating, reuse of passwords across different service providers. Previous research has identified several security vulnerabilities with desktop and browser-based password managers; however, aside from research on possibilities of phishing, the security of password manager applications on mobile devices had never been investigated comprehensively prior to this paper. We present a study of three of the most popular password managers on the Google Play Store including but not limited to their password generators, vault and metadata storage, and autofill capabilities. By building upon past findings, we identify several weaknesses in password managers including generation of weak and statistically non-random passwords, unencrypted storage of metadata and application settings, and possibilities for credential phishing. In addition, we suggest several improvements to mobile password managers, other Android applications, and the Android operating system that can improve the user experience and security of password managers on Android devices. From our observations, we also determine areas for future research that can help improve the security of password managers.
引用
收藏
页码:3 / 22
页数:20
相关论文
共 50 条
  • [31] Cheap Password Security
    Curley, B.
    Digital Systems Journal, 172 (2-3):
  • [32] PASSWORD SECURITY MEASURES
    DAVID, J
    COMMUNICATIONS OF THE ACM, 1994, 37 (06) : 11 - 11
  • [33] Security analysis of a password authenticated key exchange protocol
    Bao, F
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
  • [34] An analysis of password security risk against dictionary attacks
    Thai, Binh Le Thanh
    Tanaka, Hidema
    2022 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, ISITA, 2022, : 229 - 233
  • [35] Security and Efficiency Analysis of One Time Password Techniques
    Tzemos, Ioannis
    Fournaris, Apostolos P.
    Sklavos, Nicolas
    20TH PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2016), 2016,
  • [36] Dynamic Password Authentication : Designing Step and Security Analysis
    Pansa, Detchasit
    Chomsiri, Thawatchai
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 518 - 523
  • [37] Provable Security Analysis of the Secure Remote Password Protocol
    Dayanikli, Dennis
    Lehmann, Anja
    2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024, 2024, : 620 - 635
  • [38] An Analysis of Information Security Event Managers
    Thakur, Kutub
    Kopecky, Sandra
    Nuseir, Moath
    Ali, Md Liakat
    Qiu, Meikang
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 210 - 215
  • [39] An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools
    Jubur, Mohammed
    Shrestha, Prakash
    Saxena, Nitesh
    ACM COMPUTING SURVEYS, 2025, 57 (05)
  • [40] Security analysis of password hardened multimodal biometric fuzzy vault
    Meenakshi, V.S.
    Padmavathi, Ganapathi
    World Academy of Science, Engineering and Technology, 2009, 32 : 312 - 320