SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
Using one mobile programming language like Objective-C, Swift or Java is challenging enough because of the many things that need to be considered from a security point of view, like the programming language secure guidelines and vulnerabilities. With the introduction of Swift in 2014 it’s now possible to build Swift/Objective-C mobile applications. Building a mobile application using two languages also adds a greater attack surface for hackers because of the need for developers to stay up to date on vulnerabilities on more than one language and operating system.To our best knowledge, since as of today, there is no academic-research based effort comparing Swift, Objective-C and Android from a programming language and platform security point of view. Our comparative analysis covers a subset of OWASP top ten mobile vulnerabilities and seeing how Swift, Objective-C and Android programming languages safeguard against these risks and how the built-in platform security mechanisms for Android and Apple for the chosen subset of OWASP vulnerabilities compare when placed side-by-side.
Authors and Affiliations
Vanessa M. Santana, Paolina Centonze
Rejuvenating Public-Private Partnerships (PPPs) in Asia
Infrastructure-building has become a focus area in Asia as targeted GDP growth rates climb higher. Selection of projects as PPP projects or pure public sector projects has to be done carefully comparing costs and benef...
A Comparative Analysis of Feed-Forward and Generalized Regression Neural Networks for Face Recognition Using Principal Component Analysis
In this paper we give a comparative analysis of performance of feed forward neural network and generalized regression neural network based face recognition. We use different inner epoch for different input pattern accor...
Object-Oriented Petri Nets Virtual Organization Structure
Managing a mega organization has become an extremely complex task, especially if the organization is virtual. The operating structure of such a multi-faceted organization is very difficult to construct, and traditional o...
Fractal Modeling of Retinal Blood Vessel System
This paper proposes a novel approach to extract the main features of retinal blood vessel system. The purpose of the study is to evaluate the blood flow in the retinal blood vessel system using Darcys law, Reynolds numbe...
Code Comprehending Measure (CCM)
Software complexity, accurately, plays a vital role in life cycle of the software. Many metrics have been proposed in the past like LOC, McCabes cyclomatic measure, Halsteads measures and cognitive measure...