Vulnerability Assessment of Mobile Financial Service Applications In Bangladesh

Show simple item record

dc.contributor.author Rahman, Tanvir
dc.contributor.author Mehnaz, Tasnuva
dc.contributor.author Durjoy, Mahbubur Rahman
dc.date.accessioned 2023-03-16T09:23:09Z
dc.date.available 2023-03-16T09:23:09Z
dc.date.issued 2022-05-30
dc.identifier.citation [1] N. Bilton and B. Stelter, “Sony says playstation hacker got personal data,” The New York Times, 2011. [2] M. Jewell, “Data theft believed to be biggest hack,” The Washington Post, 2007. [3] B. Acohido, “Hackers breach heartland payment credit card system,” Retrieved October, vol. 18, no. 2011, pp. 2009–0, 2009. [4] M. A. Rahman, M. Amjad, B. Ahmed, and M. S. Siddik, “Analyzing web application vulnerabilities: an empirical study on e-commerce sector in bangladesh,” pp. 1–6, 2020. [5] D. Gillman, Y. Lin, B. Maggs, and R. K. Sitaraman, “Protecting websites from attack with secure delivery networks,” Computer, vol. 48, no. 4, pp. 26–34, 2015. [6] Y. Cifuentes, L. Beltran, and L. Ram ´ ´ırez, “Analysis of security vulnerabilities for mobile health applications,” International Journal of Health and Medical Engineering, vol. 9, no. 9, pp. 1067–1072, 2015. [7] J. Li, “Vulnerabilities mapping based on owasp-sans: a survey for static application security testing (sast),” Annals of Emerging Technologies in Computing (AETiC), Print ISSN, pp. 2516–0281, 2020. [8] E. B. Blancaflor, G. A. J. Anson, A. M. V. Encinas, et al., “A vulnerability assessment on the parental control mobile applications’ security: Status based on the owasp security requirements,” [9] G. LaMalva and S. Schmeelk, “Mobsf: Mobile health care android applications through the lens of open source static analysis,” in 2020 IEEE MIT Undergraduate Research Technology Conference (URTC), pp. 1–4, IEEE, 2020. [10] M. Patil and D. Pramod, “Andrev: Reverse engineering tool to extract permissions of android mobile apps for analysis,” in Computer Networks and Inventive Communication Technologies, pp. 1199–1207, Springer, 2021. [11] M. Naja, A. Shafana, and A. Musfira, “Automated software testing and tool selection: case study based on security testing of popular e-commerce applications in malaysia,” 2021. [12] Z. Han, X. Li, Z. Xing, H. Liu, and Z. Feng, “Learning to predict severity of software vulnerability using only vulnerability description,” pp. 125–136, 2017. en_US
dc.identifier.uri http://hdl.handle.net/123456789/1778
dc.description Supervised by Mr. Ashraful Alam Khan, Asst. Professor, Co-Supervisors: Mr. S.M. Sabit Bananee and Mr. Imtiaj Ahmed Chowdhury, Lecturer Department of Computer Science and Engineering(CSE), Islamic University of Technology (IUT) Board Bazar, Gazipur-1704, Bangladesh. This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2022. en_US
dc.description.abstract In the era of the internet and smartphone, digital financial transaction services make people’s lives easier. In Bangladesh there are several prominent Mobile Financial Service (MFS) provider companies which give service to their customers. Companies launch android and iOS applications to make this service more reachable to their clients. These applications help people to purchase, pay or transfer money with the smartphone caring in his/her hand. While developing, for many reasons like coding flaws, logical errors, misconfiguration or vulnerable architectural design in applications could lead to compromise of that system. So security is the main concern here to keep client’s money safe. This study is able to analyze the vulnerability level of top five Mo- bile Financial Service (MFS) applications available in Bangladesh. Popular scanning tools like Mobile Security Framework (MobSF), QUIXXI and Immuniweb are used to analyze this study following the Open Source Web Application Project (OWASP) Mobile Application Security Verification Standard (MASVS). After analyzing and comparing all the reports from selected tools are merged together and break down the application level vulnerabilities. Among the common issues found in almost every application, the percentage of High risk is alarming. This indicates a concern for the organization to defend against any cyber attack and also for losing reputation. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur, Bangladesh en_US
dc.subject MFS, MobSF, QUIXXI, Immuniweb, en_US
dc.title Vulnerability Assessment of Mobile Financial Service Applications In Bangladesh en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics