TY - CHAP
T1 - Data Protection Labware for Mobile Security
AU - Shahriar, Hossain
AU - Talukder, Md Arabin
AU - Chi, Hongmei
AU - Rahman, Mohammad
AU - Ahamed, Sheikh Iqbal
AU - Shalan, Atef
AU - Tarmissi, Khaled
AU - Mohamed, Atef
N1 - Hossain Shahriar Md Arabin Talukder Hongmei Chi Mohammad Rahman Sheikh Ahamed Atef Shalan Khaled Tarmissi Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611) The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via inadvertent or side channel, unsecured sensitive data storage, data transmission, and many others.
PY - 2019/7/11
Y1 - 2019/7/11
N2 - The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via inadvertent or side channel, unsecured sensitive data storage, data transmission, and many others. Most of these mobile vulnerabilities can be detected in the mobile software testing phase. However, most development teams often have virtually no time to address them due to critical project deadlines. To combat this, the more defect removal filters there are in the software development life cycle, the fewer defects that can lead to vulnerabilities will remain in the software product when it is released. In this paper, we provide details of a data protection module and how it can be enforced in mobile applications. We also share our initial experience and feedback on the module.
AB - The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via inadvertent or side channel, unsecured sensitive data storage, data transmission, and many others. Most of these mobile vulnerabilities can be detected in the mobile software testing phase. However, most development teams often have virtually no time to address them due to critical project deadlines. To combat this, the more defect removal filters there are in the software development life cycle, the fewer defects that can lead to vulnerabilities will remain in the software product when it is released. In this paper, we provide details of a data protection module and how it can be enforced in mobile applications. We also share our initial experience and feedback on the module.
UR - https://doi.org/10.1007/978-3-030-24907-6_15
U2 - 10.1007/978-3-030-24907-6_15
DO - 10.1007/978-3-030-24907-6_15
M3 - Chapter
BT - Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019, Lecture Notes in Computer Science
ER -