Data Protection Labware for Mobile Security

Hossain Shahriar, Md Arabin Talukder, Hongmei Chi, Mohammad Rahman, Sheikh Iqbal Ahamed, Atef Shalan, Khaled Tarmissi, Atef Mohamed

Research output: Contribution to book or proceedingChapter

3 Scopus citations

Abstract

The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via inadvertent or side channel, unsecured sensitive data storage, data transmission, and many others. Most of these mobile vulnerabilities can be detected in the mobile software testing phase. However, most development teams often have virtually no time to address them due to critical project deadlines. To combat this, the more defect removal filters there are in the software development life cycle, the fewer defects that can lead to vulnerabilities will remain in the software product when it is released. In this paper, we provide details of a  data protection  module and how it can be enforced in mobile applications. We also share our initial experience and feedback on the module.


Original languageAmerican English
Title of host publicationSecurity, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019, Lecture Notes in Computer Science
DOIs
StatePublished - Jul 11 2019

DC Disciplines

  • Engineering
  • Computer Engineering

Fingerprint

Dive into the research topics of 'Data Protection Labware for Mobile Security'. Together they form a unique fingerprint.

Cite this