Thinsim-Based Attacks On Mobile Money Systems

PROCEEDINGS OF THE 1ST ACM SIGCAS CONFERENCE ON COMPUTING AND SUSTAINABLE SOCIETIES (COMPASS 2018)(2018)

引用 6|浏览48
暂无评分
摘要
Phone-based mobile money is becoming the dominant paradigm for financial services in the developing world. For example, mPesa has a cash flow of over thirty billion USD, equivalent to nearly half of Kenya's GDP. Inside of these markets, competitors have appeared who leverage ThinSIMS, small SIM-card add-ons, to provide alternative mobile money implementations. However, the security implications of ThinSIMs are not well understood.To resolve this, we explore the security of phone-based mobile money systems against attacks via the SIM interface, the 3GPP-defined interface between a SIM card and a phone. Using a ThinSIM to intercept and initiate communication over the SIM interface, we demonstrate that a malicious ThinSIM can steal a user's mPesa credentials and initiate transactions without the user's consent or knowledge. We also demonstrate a similar ThinSIM-based attack against USSD-based mobile money systems that allows for similar transactions without the user's knowledge or participation. Lastly, we propose and implement modifications to both STK and USSD-based mobile money systems to limit the impact of our discovered ThinSIM-based attacks.
更多
查看译文
关键词
Developing Regions, HCI4D, ICTD, Mobile money, Security, Cellular networks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要