A Security Analysis of Password Managers on Android

被引:1
|
作者
Sharma, Abhyudaya [1 ]
Mishra, Sweta [1 ]
机构
[1] Shiv Nadar Univ, Greater Noida, India
来源
关键词
password manager; android; security; reverse engineering;
D O I
10.1007/978-3-031-49099-6_1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Password Managers are software tools designed to help users easily store and access credentials across devices while also reducing, if not eliminating, reuse of passwords across different service providers. Previous research has identified several security vulnerabilities with desktop and browser-based password managers; however, aside from research on possibilities of phishing, the security of password manager applications on mobile devices had never been investigated comprehensively prior to this paper. We present a study of three of the most popular password managers on the Google Play Store including but not limited to their password generators, vault and metadata storage, and autofill capabilities. By building upon past findings, we identify several weaknesses in password managers including generation of weak and statistically non-random passwords, unencrypted storage of metadata and application settings, and possibilities for credential phishing. In addition, we suggest several improvements to mobile password managers, other Android applications, and the Android operating system that can improve the user experience and security of password managers on Android devices. From our observations, we also determine areas for future research that can help improve the security of password managers.
引用
收藏
页码:3 / 22
页数:20
相关论文
共 50 条
  • [41] Advanced Windows NT security: Password security
    Schultz, Eugene
    Computer Security Journal, 1999, 15 (02): : 21 - 28
  • [42] Security Analysis Method of Recognition-based Graphical Password
    Khodadadi, Touraj
    Alizadeh, Mojtaba
    Gholizadeh, Somayyeh
    Zamani, Mazdak
    Darvishi, Mahdi
    JURNAL TEKNOLOGI, 2015, 72 (05):
  • [43] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [44] Security analysis of the generalized key agreement and password authentication protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    IEEE COMMUNICATIONS LETTERS, 2001, 5 (11) : 462 - 463
  • [45] SafeCandy: System for security, analysis and validation in Android
    Londono, Sebastian
    Camilo Urcuqui, Christian
    Navarro Cadavid, Andres
    Fuentes Amaya, Manuel
    Gomez, Johan
    SISTEMAS & TELEMATICA, 2015, 13 (35): : 89 - 102
  • [46] Analysis of Password Login Phishing Based Protocols for Security Improvements
    Khayal, S. H.
    Khan, A.
    Bibi, N.
    Ashraf, T.
    ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2009, : 368 - 371
  • [47] Android Security via Static Program Analysis
    Shen, Feng
    MOBISYS'17 PHD FORUM: PROCEEDINGS OF THE 2017 WORKSHOP ON MOBISYS 2017 PH.D. FORUM, 2017, : 19 - 20
  • [48] AndroidProtect: Android Apps Security Analysis System
    Zhang, Tong
    Li, Tao
    Wang, Hao
    Xiao, Zhijie
    COLLABORATE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2016, 2017, 201 : 583 - 594
  • [49] A Comparative Usability Evaluation of Traditional Password Managers
    Karole, Ambarish
    Saxena, Nitesh
    Christin, Nicolas
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 233 - +
  • [50] The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
    Zhang, Yinqian
    Monrose, Fabian
    Reiter, Michael K.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 176 - 186