Mobile security testing guide (2024)

Related Papers

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

Authorization and Authentication in Mobile Devices

2022 •

IJRASET Publication

With the rapid evolution of the wireless communication technology, user authorization and authentication is important in order to ensure the security of the wireless communication technology. Password play an important role in the process of authentication. In the process of authentication, the password enter by the user will be transmitted along the traffic to the authentication server in order to allow the server to grant access to the authorized user. The attackers will use the chance to attempt sniff others person password in order to perform some illegal activities by using others person password in order to perform some illegal activities by using others identitity to keep them safe from trouble. Due to the issues, there are many solutions has been proposed to improve the security of wireless communication technology. In this paper. The previously proposed solution will be used to enhance the security of the system.. For mobile apps , we need to make a clear distinction between user authentication and app authentication. User authentication is about how users prove that they are the legitimate apps users. App authentication covers how the app authenticates towards the backend. Sometimes device authentication also mentioned, is accessible to all apps running on your phone and generally easy to spoofs.

View PDF

The Remote Authentication Dial-In User Service (RADIUS) protocol is

2015 •

A. Dekok

View PDF

2021 •

Jorge Sancho

The widespread adoption of smartphones and the new-generation wireless networks have changed the way that people interact among themselves and with their environment. The use of messaging platforms, such as WhatsApp, has become deeply ingrained in peoples’ lives, and many digital services have started to be delivered using these communication channels. In this work, we propose a new OAuth grant type to be used when the interaction between the resource owner and the client takes place through a messaging platform. This new grant type firstly allows the authorization server to be sure that no Man-in-the-Middle risk exists between the resource owner and the client before issuing an access token. Secondly, it allows the authorization server to interact with the resource owner through the same user-agent already being used to interact with the client, i.e., the messaging platform, which is expected to improve the overall user experience of the authorization process. To verify this assump...

View PDF

International conference KNOWLEDGE-BASED ORGANIZATION

MOBILE APPLICATIONS -(in)SECURITY OVERVIEW

2019 •

Teodor Mitrea

Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the growing importance of smartphones, it is important to assess the privacy and security risks of these devices in order to mitigate them. However, as we know, in modern mobile security architecture, applications represent the most critical elements. In this paper we review common mobile applications flaws involving network communications, data storage, user input handling and also exploring a number of vulnerabilities. While apps provide amazing features and benefits for users, they also represent the main attraction for cyber criminals. In order to have a true picture of the mobile security threat spectrum, this article presents the means of how mobile applications can impact systems security, stability and compromise personal data if they`re not handled properly.

View PDF

Security in Composite Mobile Services and Load Balancing

2015 •

Trishna Panse

ABSTRACT- Composite mobile services refer to access of concurrent services at a time on a mobile phone. Nowadays due to execution of many services simultaneously at a time leads to slow process, time consumption, and excessive load on the system and security issues. “Security in Composite Mobile Services and Load Balancing ” aims at providing tool support and middleware infrastructure for the implementation and execution of composite mobile services and also balancing load at the mobile phone’s processor end. Development of this application will ease the usage of composite mobile services by the users resulting in quick speed, secure access and balanced processor load.

View PDF

2012 Tenth Annual International Conference on Privacy, Security and Trust

Service provider authentication assurance

2012 •

Christophe Rosenberger

View PDF

An Overview on Authentication Approaches and Their Usability in Conjunction with Internet and Mobile Applications

IJERA Journal

View PDF

Vetting the Security of Mobile Applications

2015 •

Vincent Sritapan

View PDF

Security issues in Mobile Computing

2018 •

Kartik Khurana

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.

View PDF

A TECHNICAL INSIGHT INTO THE CONCEPTS AND TERMINOLOGIES BEHIND OAUTH – AN OPEN STANDARD FOR AUTHORIZATION

eSAT Journals

As the world wide web matures, more and more sites rely on distributed services and cloud computing for a better scalability and efficiency to meet their enhanced needs. Some examples are: a printer printing the Flickr photos, a Facebook like social network using your Google account to find friends, or any third-party programs utilizing APIs from multiple websites. The problem is, in order for these external applications to access user data from other sites, they ask for your usernames and passwords. Not only does this require exposing your secure credentials to non trustable sources ; but also provides these application unlimited access to access your account as they wish. If they get this credentials then they have unlimited access to your account and at the worst, they can change your passwords and lock your access as well. Often the same passwords may be used for online banking and other secure transactions. OAuth is an Open Standard to allow users to grant a third-party access to their resources without sharing their actual passwords. It also provides a way to grant limited access to resources with respect to scope, duration, location etc.

View PDF
Mobile security testing guide (2024)

References

Top Articles
Latest Posts
Article information

Author: Fredrick Kertzmann

Last Updated:

Views: 6468

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Fredrick Kertzmann

Birthday: 2000-04-29

Address: Apt. 203 613 Huels Gateway, Ralphtown, LA 40204

Phone: +2135150832870

Job: Regional Design Producer

Hobby: Nordic skating, Lacemaking, Mountain biking, Rowing, Gardening, Water sports, role-playing games

Introduction: My name is Fredrick Kertzmann, I am a gleaming, encouraging, inexpensive, thankful, tender, quaint, precious person who loves writing and wants to share my knowledge and understanding with you.