{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:35:52Z","timestamp":1771612552931,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030321000","type":"print"},{"value":"9783030321017","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32101-7_15","type":"book-chapter","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T11:04:00Z","timestamp":1570791840000},"page":"234-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Short Paper: How to Attack PSD2 Internet Banking"],"prefix":"10.1007","author":[{"given":"Vincent","family":"Haupert","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Gabert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,30]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-39884-1_27","volume-title":"Financial Cryptography and Data Security","author":"M Adham","year":"2013","unstructured":"Adham, M., Azodi, A., Desmedt, Y., Karaolis, I.: How to attack two-factor authentication internet banking. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 322\u2013328. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-39884-1_27"},{"key":"15_CR2","unstructured":"Bankenverband\/GfK: Online-Banking in Deutschland (2018). \n                      http:\/\/go.bdb.de\/UHbYz"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S.P., Anderson, R.J.: Chip and skim: cloning EMV cards with the pre-play attack. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, pp. 49\u201364, 18\u201321 May 2014. \n                      https:\/\/doi.org\/10.1109\/SP.2014.11","DOI":"10.1109\/SP.2014.11"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montr\u00e9al, Qu\u00e9bec, Canada, pp. 581\u2013590, 22\u201327 April 2006. \n                      https:\/\/doi.org\/10.1145\/1124772.1124861","DOI":"10.1145\/1124772.1124861"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-662-45472-5_24","volume-title":"Financial Cryptography and Data Security","author":"A Dmitrienko","year":"2014","unstructured":"Dmitrienko, A., Liebchen, C., Rossow, C., Sadeghi, A.-R.: On the (in)security of mobile two-factor authentication. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 365\u2013383. Springer, Heidelberg (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-662-45472-5_24"},{"key":"15_CR6","unstructured":"Dutch Payments Association: Dutch banks introduce innovative IBAN-Name Check (2017). \n                      https:\/\/www.betaalvereniging.nl\/en\/actueel\/persberichten\/dutch-banks-introduce-innovative-iban-name-check\/"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Etaher, N., Weir, G.R.S., Alazab, M.: From ZeuS to zitmo: Trends in banking malware. In: 2015 IEEE TrustCom\/BigDataSE\/ISPA, Helsinki, Finland, vol. 1, pp. 1386\u20131391, 20\u201322 August 2015. \n                      https:\/\/doi.org\/10.1109\/Trustcom.2015.535","DOI":"10.1109\/Trustcom.2015.535"},{"key":"15_CR8","unstructured":"European Commission: Commission delegated regulation (EU) 2018\/389 supplementing directive (EU) 2015\/2366 of the European parliament and of the council with regard to regulatory technical standards for strong customer authentication and common and secure open standards of communication (2018). \n                      https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32018R0389"},{"key":"15_CR9","unstructured":"European Commission: Internet banking on the rise (2018). \n                      http:\/\/ec.europa.eu\/eurostat\/web\/products-eurostat-news\/-\/DDN-20180115-1"},{"key":"15_CR10","unstructured":"European Union Agency for Network and Information Security: Flash note: EU cyber security agency ENISA; \u201chigh roller\u201d online bank robberies reveal security gaps (2012). \n                      https:\/\/www.enisa.europa.eu\/news\/enisa-news\/copy_of_eu-cyber-security-agency-enisa-201chigh-roller201d-online-bank-robberies-reveal-security-gaps"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-642-39884-1_12","volume-title":"Financial Cryptography and Data Security","author":"S Fahl","year":"2013","unstructured":"Fahl, S., Harbach, M., Oltrogge, M., Muders, T., Smith, M.: Hey, you, get off of my clipboard. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 144\u2013161. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-39884-1_12"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s13389-015-0112-3","volume":"6","author":"H Ferradi","year":"2016","unstructured":"Ferradi, H., G\u00e9raud, R., Naccache, D., Tria, A.: When organized crime applies academic results: a forensic analysis of an in-card listening device. J. Cryptogr. Eng. 6(1), 49\u201359 (2016). \n                      https:\/\/doi.org\/10.1007\/s13389-015-0112-3","journal-title":"J. Cryptogr. Eng."},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Haupert, V., Maier, D., M\u00fcller, T.: Paying the price for disruption: how a fintech allowed account takeover. In: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, pp. 7:1\u20137:10. ROOTS, ACM, New York (2017). \n                      https:\/\/doi.org\/10.1145\/3150376.3150383","DOI":"10.1145\/3150376.3150383"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-93411-2_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"V Haupert","year":"2018","unstructured":"Haupert, V., Maier, D., Schneider, N., Kirsch, J., M\u00fcller, T.: Honey, i shrunk your app security: the state of android app hardening. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 69\u201391. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-93411-2_4"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-662-54970-4_24","volume-title":"Financial Cryptography and Data Security","author":"RK Konoth","year":"2017","unstructured":"Konoth, R.K., van der Veen, V., Bos, H.: How anywhere computing just killed your phone-based two-factor authentication. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 405\u2013421. Springer, Heidelberg (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-662-54970-4_24"},{"key":"15_CR16","unstructured":"Miller, C.: Here\u2019s how iOS 12\u2019s new security code auto-fill feature works (2018). \n                      https:\/\/9to5mac.com\/2018\/06\/04\/safari-security-code-auto-fill"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-39235-1_9","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C Mulliner","year":"2013","unstructured":"Mulliner, C., Borgaonkar, R., Stewin, P., Seifert, J.-P.: SMS-based one-time passwords: attacks and defense. In: Rieck, K., Stewin, P., Seifert, J.-P. (eds.) DIMVA 2013. LNCS, vol. 7967, pp. 150\u2013159. Springer, Heidelberg (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-642-39235-1_9"},{"key":"15_CR18","unstructured":"Mulliner, C., Golde, N., Seifert, J.: SMS of death: from analyzing to attacking mobile phones on a large scale. In: Proceedings of the 20th USENIX Security Symposium, San Francisco, CA, USA, 8\u201312 August 2011. \n                      http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Mulliner.pdf"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-662-54970-4_35","volume-title":"Financial Cryptography and Data Security","author":"SJ Murdoch","year":"2017","unstructured":"Murdoch, S.J., et al.: Are payment card contracts unfair? (short paper). In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 600\u2013608. Springer, Heidelberg (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-662-54970-4_35"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Murdoch, S.J., Drimer, S., Anderson, R.J., Bond, M.: Chip and PIN is broken. In: 31st IEEE Symposium on Security and Privacy, S&P 2010, Berleley\/Oakland, California, USA, pp. 433\u2013446, 16\u201319 May 2010. \n                      https:\/\/doi.org\/10.1109\/SP.2010.33","DOI":"10.1109\/SP.2010.33"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Rao, S.P., Kotte, B.T., Holtmanns, S.: Privacy in LTE networks. In: Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016, Xi\u2019an, China, pp. 176\u2013183, 18\u201320 June 2016. \n                      http:\/\/dl.acm.org\/citation.cfm?id=3021417","DOI":"10.4108\/eai.18-6-2016.2264393"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Rupprecht, D., Kohls, K., Holz, T., P\u00f6pper, C.: Breaking LTE on layer two. In: IEEE Symposium on Security & Privacy (SP). IEEE, May 2019","DOI":"10.1109\/SP.2019.00006"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor\u2019s new security indicators. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), Oakland, California, USA, pp. 51\u201365, 20\u201323 May 2007. \n                      https:\/\/doi.org\/10.1109\/SP.2007.35","DOI":"10.1109\/SP.2007.35"},{"issue":"5","key":"15_CR24","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSP.2016.101","volume":"14","author":"B Schneier","year":"2016","unstructured":"Schneier, B.: Stop trying to fix the user. IEEE Secur. Priv. 14(5), 96 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Watson, B., Zheng, J.: On the user awareness of mobile security recommendations. In: Proceedings of the 2017 ACM Southeast Regional Conference, Kennesaw, GA, USA, pp. 120\u2013127, 13\u201315 April 2017. \n                      https:\/\/doi.org\/10.1145\/3077286.3077563","DOI":"10.1145\/3077286.3077563"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-319-08509-8_5","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Du, W.: Attacks on android clipboard. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 72\u201391. Springer, Cham (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-319-08509-8_5"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32101-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T11:06:40Z","timestamp":1570792000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32101-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030321000","9783030321017"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32101-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Kitts","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Kitts and Nevis","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc19.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"178","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,08","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7,6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}