{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:08:23Z","timestamp":1766732903499,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243074"},{"type":"electronic","value":"9783030243081"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24308-1_49","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T11:03:03Z","timestamp":1561719783000},"page":"613-626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Forensic Analysis of Mobile Banking Apps"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8406-9467","authenticated-orcid":false,"given":"Oluwafemi","family":"Osho","sequence":"first","affiliation":[]},{"given":"Uthman L.","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Nanfa N.","family":"Nimzing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1082-0542","authenticated-orcid":false,"given":"Andrew A.","family":"Uduimoh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-9331","authenticated-orcid":false,"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"49_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.cose.2014.01.004","volume":"42","author":"C Ntantogian","year":"2014","unstructured":"Ntantogian, C., Apostolopoulos, D., Marinakis, G., Xenakis, C.: Evaluating the privacy of Android mobile applications under forensic analysis. Comput. Secur. 42, 66\u201376 (2014)","journal-title":"Comput. Secur."},{"key":"49_CR2","unstructured":"Statista: Number of smartphone users worldwide from 2014 to 2020 (in billions), 29 March 2019"},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Nie, J., Hu, X.: Mobile banking information security and protection methods. In: 2008 International Conference on Computer Science and Software Engineering Mobile, pp. 587\u2013590 (2008)","DOI":"10.1109\/CSSE.2008.1422"},{"issue":"2","key":"49_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.12816\/0003615","volume":"1","author":"JA Odumeru","year":"2013","unstructured":"Odumeru, J.A.: Going cashless: adoption of mobile banking in Nigeria. Arab. J. Bus. Manag. Rev. (Niger. Chapter) 1(2), 9\u201317 (2013)","journal-title":"Arab. J. Bus. Manag. Rev. (Niger. Chapter)"},{"issue":"1","key":"49_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.tele.2014.05.003","volume":"32","author":"AA Shaikh","year":"2015","unstructured":"Shaikh, A.A., Karjaluoto, H.: Telematics and informatics mobile banking adoption: a literature review. Telematics Inform. 32(1), 129\u2013142 (2015)","journal-title":"Telematics Inform."},{"issue":"2","key":"49_CR6","first-page":"1","volume":"47","author":"FO Bankole","year":"2011","unstructured":"Bankole, F.O., Bankole, O.O., Brown, I.: Mobile banking adoption in Nigeria. Electron. J. Inf. Syst. Dev. Ctries. 47(2), 1\u201323 (2011)","journal-title":"Electron. J. Inf. Syst. Dev. Ctries."},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Bankole, O., Cloete, E.: Mobile banking: a comparative study of South Africa and Nigeria. In: IEEE Africon 2011, Livingstone, Zambia, pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/AFRCON.2011.6072178"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.procs.2015.07.177","volume":"56","author":"G Fenu","year":"2015","unstructured":"Fenu, G., Pau, P.L.: An analysis of features and tendencies in mobile banking apps. Procedia Comput. Sci. 56, 26\u201333 (2015). Elsevier Masson SAS","journal-title":"Procedia Comput. Sci."},{"key":"49_CR9","unstructured":"Citi: Mobile Banking One of Top Three Most Used Apps by Americans, 2018 Citi Mobile Banking Study Reveals (2018). (30 Mar 2019)"},{"key":"49_CR10","unstructured":"Juniper Research: Mobile Banking Users to Reach 2 Billion by 2020, Representing More than 1 in 3 of Global Adult Population, 30 Mar 2019"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Elkhodr, M., Shahrestani, S., Kourouche, K.: A proposal to improve the security of mobile banking applications. In: 2012 Tenth International Conference on ICT and Knowledge Engineering A, pp. 260\u2013265 (2012)","DOI":"10.1109\/ICTKE.2012.6408565"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Osho, O., Yisa, V.L., Ogunleke, O.Y., Abdulhamid, S.M.: Mobile spamming in Nigeria: an empirical survey. In: 2015 International Conference on Cyberspace Governance, pp. 150\u2013159 (2015)","DOI":"10.1109\/CYBER-Abuja.2015.7360503"},{"issue":"6","key":"49_CR13","first-page":"50","volume":"3","author":"EM Agwu","year":"2014","unstructured":"Agwu, E.M., Carter, A.: Mobile phone banking in Nigeria: benefits, problems and prospects. Int. J. Bus. Commer. 3(6), 50\u201370 (2014)","journal-title":"Int. J. Bus. Commer."},{"key":"49_CR14","unstructured":"NCC: Monthly Subscriber Technology Data. Subscriber Statistics, 29 Mar 2019"},{"key":"49_CR15","unstructured":"Osho, O., Ajisola, T.H., Onoja, A.D., Ugwu, J.N.: Were we ready in the first place?: an analysis of cashless policy implementation in Nigeria. In: CEUR Workshop Proceedings, pp. 70\u201378 (2016)"},{"issue":"6","key":"49_CR16","doi-asserted-by":"publisher","first-page":"107","DOI":"10.14257\/ijunesst.2014.7.6.10","volume":"7","author":"MS Islam","year":"2014","unstructured":"Islam, M.S.: Systematic literature review: security challenges of mobile banking and payments system. Int. J. u- e-Serv. Sci. Technol. 7(6), 107\u2013116 (2014)","journal-title":"Int. J. u- e-Serv. Sci. Technol."},{"key":"49_CR17","unstructured":"Mueller, B., Scheier, S., Willemsen, J.: Mobile Security Testing Guide (MSTG). Open Web Application Security Project (OWASP), pp. 1\u2013412 (2019)"},{"issue":"January","key":"49_CR18","first-page":"74","volume":"1","author":"O Osho","year":"2016","unstructured":"Osho, O., Ohida, S.O.: Comparative evaluation of mobile forensic tools. IJ Inf. Technol. Comput. Sci. 1(January), 74\u201383 (2016)","journal-title":"IJ Inf. Technol. Comput. Sci."},{"key":"49_CR19","unstructured":"Scheier, S., Willemsen, J.: OWASP Mobile Application Security Verification Standard (MASVS) version 1.1.3. Open Web Application Security Project (OWASP), 99. 1\u201332 (2019)"},{"issue":"1","key":"49_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/00450618.2016.1182589","volume":"50","author":"R Chanajitt","year":"2018","unstructured":"Chanajitt, R., Viriyasitavat, W., Choo, K.R.: Forensic analysis and security assessment of Android m-banking apps. Aust. J. Forensic Sci. 50(1), 3\u201319 (2018)","journal-title":"Aust. J. Forensic Sci."},{"issue":"Suppl","key":"49_CR21","doi-asserted-by":"publisher","first-page":"S24","DOI":"10.1016\/j.diin.2012.05.007","volume":"9","author":"N Al Mutawa","year":"2012","unstructured":"Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Invest 9(Suppl), S24\u2013S33 (2012)","journal-title":"Digit. Invest"},{"key":"49_CR22","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.procs.2017.05.421","volume":"109","author":"T Alyahya","year":"2017","unstructured":"Alyahya, T., Kausar, F.: Snapchat analysis to discover digital forensic artifacts on Android smartphone. Procedia Comput. Sci. 109, 1035\u20131040 (2017)","journal-title":"Procedia Comput. Sci."},{"key":"49_CR23","doi-asserted-by":"publisher","first-page":"S77","DOI":"10.1016\/j.diin.2015.05.009","volume":"14","author":"D Walnycky","year":"2015","unstructured":"Walnycky, D., Baggili, I., Marrington, A., Moore, J., Breitinger, F.: Network and device forensic analysis of Android social-messaging applications. Digit. Invest. 14, S77\u2013S84 (2015)","journal-title":"Digit. Invest."},{"key":"49_CR24","unstructured":"Adebayo, O.S., Sulaimon, S.A., Osho, O., Abdulhamid, S.M., Alhassan, J.K.: Forensic analysis of Kik messenger on Android devices. In: 2nd International Engineering Conference (IEC 2017), Minna, Nigeria (2017)"},{"key":"49_CR25","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.diin.2016.04.001","volume":"17","author":"KM Ovens","year":"2016","unstructured":"Ovens, K.M., Morison, G.: Forensic analysis of Kik messenger on iOS devices. Digit. Invest. 17, 40\u201352 (2016)","journal-title":"Digit. Invest."},{"issue":"5","key":"49_CR26","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1111\/1556-4029.13164","volume":"61","author":"A Azfar","year":"2016","unstructured":"Azfar, A., Choo, K.R., Liu, L.: An Android communication app forensic taxonomy. J. Forensic Sci. 61(5), 1337\u20131350 (2016)","journal-title":"J. Forensic Sci."},{"key":"49_CR27","unstructured":"Azfar, A., Choo, K.R., Liu, L.: Forensic taxonomy of popular Android mHealth apps. In: 21st Americas Conference on Information Systems, pp. 1\u201319 (2015)"},{"key":"49_CR28","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1007\/s11277-013-1258-x","volume":"73","author":"JH Jung","year":"2013","unstructured":"Jung, J.H., Kim, J.Y., Lee, H.C., Yi, J.H.: Repackaging attack on android banking applications and its countermeasures. Wirel. Pers. Commun. 73, 1421\u20131437 (2013)","journal-title":"Wirel. Pers. Commun."},{"key":"49_CR29","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/978-3-319-28658-7_57","volume-title":"Advances in Signal Processing and Intelligent Recognition Systems","author":"S Bojjagani","year":"2016","unstructured":"Bojjagani, S., Sastry, V.N.: STAMBA: security testing for Android mobile banking apps. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, K.C., Mosin, S., Ma, M. (eds.) Advances in Signal Processing and Intelligent Recognition Systems. AISC, vol. 425, pp. 671\u2013683. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-28658-7_57"},{"key":"49_CR30","unstructured":"Chen, S., Meng, G., Su, T., Fan, L., Xue, M., Xue, Y., et al.: AUSERA: large-scale automated security risk assessment of global mobile banking apps. \n                      arXiv:180505236\n                      \n                    , pp. 1\u201314 (2018)"},{"issue":"1","key":"49_CR31","first-page":"9","volume":"6","author":"AA Uduimoh","year":"2018","unstructured":"Uduimoh, A.A., Ismaila, I., Osho, O., Abdulhamid, S.M.: Forensic analysis of mobile banking applications in Nigeria. i-manager\u2019s. J. Mobile Appl. Technol. 6(1), 9\u201320 (2018)","journal-title":"i-manager\u2019s J. Mobile Appl. Technol."},{"issue":"5","key":"49_CR32","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1108\/ICS-02-2014-0013","volume":"23","author":"H Srivastava","year":"2015","unstructured":"Srivastava, H., Tapaswi, S.: Logical acquisition and analysis of data from android mobile devices. Inf. Comput. Secur. 23(5), 450\u2013475 (2015)","journal-title":"Inf. Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24308-1_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T11:14:32Z","timestamp":1561720472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24308-1_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243074","9783030243081"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24308-1_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}