Pass the PMP® Exam on Your First Try — Expert-Led Training
Learn Backend Development Part-Time, Online
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore common vulnerabilities, security verification techniques, and best practices for implementing e-banking transaction authorization in this 32-minute conference talk from AppSecEU 2015 in Amsterdam. Delve into various operation authorization methods, analyze their potential weaknesses, and understand the challenges posed by malware. Learn about recommended approaches for enhancing security, including specific requirements for implementation and verification. Gain insights into future developments in e-banking security as presented by Wojtek Dworakowski, an expert in the field.
Syllabus
Intro
Wojtek Dworakowski
Operation authorization methods
IDEAS ARE GREAT
What's wrong with these?
SMS number change
Example #3
Step 1: User enters transaction data
Step 2: User enters authorization data
Transaction signing' using SMS code
What could possibly go wrong?
Malware VS operation auth ex1
Recommendations
Malware VS operation auth ex 2
Requirements for implementation / verification
Future work
Taught by
OWASP Foundation