A Threat modeling approach to analyze and mitigate WhatsApp attacks: A Review

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)(2023)

引用 0|浏览1
暂无评分
摘要
One of the most popularly used features on smart-phones is WhatsApp. It is a free messaging app available for An-droid, IOS, and all other smartphones. A WhatsApp vulnerability is a hole or a weakness in the app, which can be a design flaw or an implementation bug. Through bug, an attacker can enter into the app and cause harm to the database of an application. A database contains private information like backup files, chatting information, contacts, etc. The most dangerous vulnerability in WhatsApp are Authentication, Account Hijacking, and Message Manipulation. In these vulnerabilities, an attacker can manip-ulate the message but not hijack the entire account. There are some basic requirements for a secure and privacy-preserving chat service, database backup, encrypted database, etc. The awareness about the vulnerability of WhatsApp and its security settings in new versions of WhatsApp. Use WhatsApp security features and secure the services of the application. This paper aims to be aware of the risks and vulnerabilities of WhatsApp and use the Threat modeling method to mitigate its vulnerability. It used threat Modelling steps to help organizations to quantify risks and vulnerabilities, ensuring those that need the most attention and resources do so to minimize their attack surface in a purposeful way.
更多
查看译文
关键词
WhatsApp,Vulnerabilities,Security Threat Modelling,Database Security,Backup,Cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要