Authors :
Rajesh Kumar
Volume/Issue :
Volume 9 - 2024, Issue 8 - August
Google Scholar :
https://tinyurl.com/mrr7rvyb
Scribd :
https://tinyurl.com/ju8e45jf
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24AUG464
Abstract :
Due to their ease of use and accessibility to a
vast array of services, mobile applications have become
indispensable in our everyday lives. Still, there are more
security dangers as a result of the quick spread of mobile
apps (Basavala, 2013). This article examines typical
vulnerabilities that affect mobile applications and the
techniques used to identify and fix them. It concentrates
on the vulnerability assessment of mobile applications
(Basavala, 2013). This research tries to highlight the
significance of protecting mobile apps by an examination
of many vulnerability categories, including inadequate
encryption, unsafe communication, and insecure data
storage (Basavala, 2013). This article offers insight into
how developers, security experts, and organizations may
proactively detect and mitigate vulnerabilities in mobile
apps by going over the tools, methodologies, and best
practices for doing vulnerability assessments (He, 2015).
In the end, this paper highlights how important it is to
have strong security mechanisms in place to secure user
data and mobile apps in an increasingly interconnected
digital economy (He, 2015).
Keywords :
Mobile Applications, Insecure Data Storage, Vulnerabilities, Digital Economy, Inadequate Encryption, Unsafe Communication.
References :
- Basavala, S. R., Kumar, N., & Aggarwal, A. (2013, April). Mobile applications-vulnerability assessment through static and dynamic analysis. In Conference on Advances in Communication and Control Systems (CAC2S 2013) (pp. 673-679). Atlantis Press.
- He, D., Chan, S., & Guizani, M. (2015). Mobile application security: malware threats and defenses. IEEE Wireless Communications, 22(1), 138-144.
- Linares-Vásquez, M., Bavota, G., & Escobar-Velásquez, C. (2017, May). An empirical study on android-related vulnerabilities. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) (pp. 2-13). IEEE.
- Shezan, F. H., Afroze, S. F., & Iqbal, A. (2017, January). Vulnerability detection in recent Android apps: An empirical study. In 2017 International Conference on Networking, Systems and Security (NSysS) (pp. 55-63). IEEE.
- Mendoza, A., & Gu, G. (2018, May). Mobile application web API reconnaissance: Web-to-mobile inconsistencies & vulnerabilities. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 756-769). IEEE.
- Zein, S., Salleh, N., & Grundy, J. (2016). A systematic mapping study of mobile application testing techniques. Journal of Systems and Software, 117, 334-356.
- Tundis, A., Mazurczyk, W., & Mühlhäuser, M. (2018, August). A review of network vulnerabilities scanning tools: Types, capabilities, and functioning. In Proceedings of the 13th international conference on availability, reliability, and security (pp. 1-10).
- Fonseca, J., Vieira, M., & Madeira, H. (2007, December). Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks. In 13th Pacific Rim international symposium on dependable computing (PRDC 2007) (pp. 365-372). IEEE.
- Zabicki, R., & Ellis, S. R. (2017). Penetration testing. In Computer and information security handbook (pp. 1031-1038). Morgan Kaufmann.
- Thatikonda, V., & Mudunuri, H. R. V. Writing Secure Code in the Digital Age: Preventing Common Vulnerabilities. International Journal of Computer Applications, 975, 8887.
- Schmitz, S., & Schiffner, S. (2021). Responsible vulnerability disclosure under the NIS 2.0 proposal. J. Intell. Prop. Info. Tech. & Elec. Com. L., 12, 448.
- Walshe, T., & Simpson, A. (2020, February). An empirical study of bug bounty programs. In 2020 IEEE 2nd international workshop on intelligent bug fixing (IBF) (pp. 35-44). IEEE.
- Souppaya, M., & Scarfone, K. (2013). Guidelines for managing the security of mobile devices in the enterprise. NIST special publication, 800(124), 124-800.
- Amarasekera, P. A. I. U. (2018). An Automated tool for detection and enforcement of security in mobile application development (Doctoral dissertation).
- Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727-1765.
Due to their ease of use and accessibility to a
vast array of services, mobile applications have become
indispensable in our everyday lives. Still, there are more
security dangers as a result of the quick spread of mobile
apps (Basavala, 2013). This article examines typical
vulnerabilities that affect mobile applications and the
techniques used to identify and fix them. It concentrates
on the vulnerability assessment of mobile applications
(Basavala, 2013). This research tries to highlight the
significance of protecting mobile apps by an examination
of many vulnerability categories, including inadequate
encryption, unsafe communication, and insecure data
storage (Basavala, 2013). This article offers insight into
how developers, security experts, and organizations may
proactively detect and mitigate vulnerabilities in mobile
apps by going over the tools, methodologies, and best
practices for doing vulnerability assessments (He, 2015).
In the end, this paper highlights how important it is to
have strong security mechanisms in place to secure user
data and mobile apps in an increasingly interconnected
digital economy (He, 2015).
Keywords :
Mobile Applications, Insecure Data Storage, Vulnerabilities, Digital Economy, Inadequate Encryption, Unsafe Communication.