SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8

Abstract

Using one mobile programming language like Objective-C, Swift or Java is challenging enough because of the many things that need to be considered from a security point of view, like the programming language secure guidelines and vulnerabilities. With the introduction of Swift in 2014 it’s now possible to build Swift/Objective-C mobile applications. Building a mobile application using two languages also adds a greater attack surface for hackers because of the need for developers to stay up to date on vulnerabilities on more than one language and operating system.To our best knowledge, since as of today, there is no academic-research based effort comparing Swift, Objective-C and Android from a programming language and platform security point of view. Our comparative analysis covers a subset of OWASP top ten mobile vulnerabilities and seeing how Swift, Objective-C and Android programming languages safeguard against these risks and how the built-in platform security mechanisms for Android and Apple for the chosen subset of OWASP vulnerabilities compare when placed side-by-side.

Authors and Affiliations

Vanessa M. Santana, Paolina Centonze

Keywords

Related Articles

Hand gesture recognition using average background and logical heuristic equations

This paper introduces a hand gesture recognition algorithm for Human Computer Interaction using real-time video streaming .The background subtraction technique is used to extract the ROI (Region Of Interest) of the hand....

Face Detection & Recognition using Tensor Flow: A Review

Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be appli...

Identification of Cardiac Diseases from(ECG) Signals based on Fractal Analysis

This paper investigates the use of fractal geometry for analyzing ECG time series signals. A technique of identifying cardiac diseases is proposed which is based on estimation of Fractal Dimension (FD) of ECG recordings....

An Improved Min-Min Task Scheduling Algorithm with Grid Utilization and Minimized Makespan

Grid computing is hardware and software infrastructure which offers a economical, distributable, coordinated and credible access to strong computational abilities [1]. For optimal use of the abilities of large distribute...

Monitoring Pareto Type IV SRGM using SPC

The Reliability of the Software Process can be monitored efficiently using Statistical Process Control (SPC). SPC is the application of statistical techniques to control a process. SPC is a study of the best ways of des...

Download PDF file
  • EP ID EP650858
  • DOI 10.24297/ijct.v15i8.3754
  • Views 84
  • Downloads 0

How To Cite

Vanessa M. Santana, Paolina Centonze (2016). SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(8), 7008-7020. https://europub.co.uk/articles/-A-650858