Case study to identify vulnerabilities in applications developed for the Android
DOI:
https://doi.org/10.56394/aris2.v2i2.22Keywords:
Android, cybersecurity, owasp, Vulnerabilities, kaliAbstract
The growing use of mobile devices has caused many developers to focus more on design and user experience, but with this neglected security issues, whether due to lack of knowledge in this field or lack of delivery time, thus exposing thousands of users to information leaks among other malicious actions. In this sense, this work aims to expose the main vulnerabilities that impact the security of a mobile application, going through analyzes in mobile applications, with the intention of alerting developers about the flaws that are usually present in the applications due to bad coding practices and to reflect on how to make your apps more secure.
References
E. Chin and D. Wagner, “Bifocals: Analyzing WebView Vulnerabilities in Android Applications,” in Information Security Applications, vol. 8267, Y. Kim, H. Lee, and A. Perrig, Eds. Cham: Springer International Publishing, 2014, pp. 138–159. doi: 10.1007/978-3-319-05149-9_9. DOI: https://doi.org/10.1007/978-3-319-05149-9_9
J. N. O.S. and S. Mary Saira Bhanu, “A Survey on Code Injection Attacks in Mobile Cloud Computing Environment,” in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Jan. 2018, pp. 1–6. doi: 10.1109/CONFLUENCE.2018.8443032 DOI: https://doi.org/10.1109/CONFLUENCE.2018.8443032
N. Mateus-Coelho and M. Cruz-Cunha, "Serverless Service Architectures and Security Minimals," 2022 10th International Symposium on Digital Forensics and Security (ISDFS), Istanbul, Turkey, 2022, pp. 1-6, doi: 10.1109/ISDFS55398.2022.9800779. DOI: https://doi.org/10.1109/ISDFS55398.2022.9800779
J. J. Drake, Z. Lanier, C. Mulliner, P. Oliva Fora, S. A. Ridley, and G. Wicherski, Android Hacker´s Handbook. Ed. Indianapolis, IN: John Wiley & Sons, 2014.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Tatiani de Andrade

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.