Vulnerability Assessment of Mobile Applications


Authors : Rajesh Kumar

Volume/Issue : Volume 9 - 2024, Issue 8 - August

Google Scholar : https://tinyurl.com/mrr7rvyb

Scribd : https://tinyurl.com/ju8e45jf

DOI : https://doi.org/10.38124/ijisrt/IJISRT24AUG464

Abstract : Due to their ease of use and accessibility to a vast array of services, mobile applications have become indispensable in our everyday lives. Still, there are more security dangers as a result of the quick spread of mobile apps (Basavala, 2013). This article examines typical vulnerabilities that affect mobile applications and the techniques used to identify and fix them. It concentrates on the vulnerability assessment of mobile applications (Basavala, 2013). This research tries to highlight the significance of protecting mobile apps by an examination of many vulnerability categories, including inadequate encryption, unsafe communication, and insecure data storage (Basavala, 2013). This article offers insight into how developers, security experts, and organizations may proactively detect and mitigate vulnerabilities in mobile apps by going over the tools, methodologies, and best practices for doing vulnerability assessments (He, 2015). In the end, this paper highlights how important it is to have strong security mechanisms in place to secure user data and mobile apps in an increasingly interconnected digital economy (He, 2015).

Keywords : Mobile Applications, Insecure Data Storage, Vulnerabilities, Digital Economy, Inadequate Encryption, Unsafe Communication.

References :

  1. Basavala, S. R., Kumar, N., & Aggarwal, A. (2013, April). Mobile applications-vulnerability assessment through static and dynamic analysis. In Conference on Advances in Communication and Control Systems (CAC2S 2013) (pp. 673-679). Atlantis Press.
  2. He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and defenses. IEEE Wireless Communications, 22(1), 138-144.
  3. Linares-Vásquez, M., Bavota, G., & Escobar-Velásquez, C. (2017, May). An empirical study on android-related vulnerabilities. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) (pp. 2-13). IEEE.
  4. Shezan, F. H., Afroze, S. F., & Iqbal, A. (2017, January). Vulnerability detection in recent Android apps: An empirical study. In 2017 International Conference on Networking, Systems and Security (NSysS) (pp. 55-63). IEEE.
  5. Mendoza, A., & Gu, G. (2018, May). Mobile application web API reconnaissance: Web-to-mobile inconsistencies & vulnerabilities. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 756-769). IEEE.
  6. Zein, S., Salleh, N., & Grundy, J. (2016). A systematic mapping study of mobile application testing techniques. Journal of Systems and Software, 117, 334-356.
  7. Tundis, A., Mazurczyk, W., & Mühlhäuser, M. (2018, August). A review of network vulnerabilities scanning tools: Types, capabilities, and functioning. In Proceedings of the 13th international conference on availability, reliability, and security (pp. 1-10).
  8. Fonseca, J., Vieira, M., & Madeira, H. (2007, December). Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks. In 13th Pacific Rim international symposium on dependable computing (PRDC 2007) (pp. 365-372). IEEE.
  9. Zabicki, R., & Ellis, S. R. (2017). Penetration testing. In Computer and information security handbook (pp. 1031-1038). Morgan Kaufmann.
  10. Thatikonda, V., & Mudunuri, H. R. V. Writing Secure Code in the Digital Age: Preventing Common Vulnerabilities. International Journal of Computer Applications, 975, 8887.
  11. Schmitz, S., & Schiffner, S. (2021). Responsible vulnerability disclosure under the NIS 2.0 proposal. J. Intell. Prop. Info. Tech. & Elec. Com. L., 12, 448.
  12. Walshe, T., & Simpson, A. (2020, February). An empirical study of bug bounty programs. In 2020 IEEE 2nd international workshop on intelligent bug fixing (IBF) (pp. 35-44). IEEE.
  13. Souppaya, M., & Scarfone, K. (2013). Guidelines for managing the security of mobile devices in the enterprise. NIST special publication, 800(124), 124-800.
  14. Amarasekera, P. A. I. U. (2018). An Automated tool for detection and enforcement of security in mobile application development (Doctoral dissertation).
  15. Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765.

Due to their ease of use and accessibility to a vast array of services, mobile applications have become indispensable in our everyday lives. Still, there are more security dangers as a result of the quick spread of mobile apps (Basavala, 2013). This article examines typical vulnerabilities that affect mobile applications and the techniques used to identify and fix them. It concentrates on the vulnerability assessment of mobile applications (Basavala, 2013). This research tries to highlight the significance of protecting mobile apps by an examination of many vulnerability categories, including inadequate encryption, unsafe communication, and insecure data storage (Basavala, 2013). This article offers insight into how developers, security experts, and organizations may proactively detect and mitigate vulnerabilities in mobile apps by going over the tools, methodologies, and best practices for doing vulnerability assessments (He, 2015). In the end, this paper highlights how important it is to have strong security mechanisms in place to secure user data and mobile apps in an increasingly interconnected digital economy (He, 2015).

Keywords : Mobile Applications, Insecure Data Storage, Vulnerabilities, Digital Economy, Inadequate Encryption, Unsafe Communication.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe