SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
Using one mobile programming language like Objective-C, Swift or Java is challenging enough because of the many things that need to be considered from a security point of view, like the programming language secure guidelines and vulnerabilities. With the introduction of Swift in 2014 it’s now possible to build Swift/Objective-C mobile applications. Building a mobile application using two languages also adds a greater attack surface for hackers because of the need for developers to stay up to date on vulnerabilities on more than one language and operating system.To our best knowledge, since as of today, there is no academic-research based effort comparing Swift, Objective-C and Android from a programming language and platform security point of view. Our comparative analysis covers a subset of OWASP top ten mobile vulnerabilities and seeing how Swift, Objective-C and Android programming languages safeguard against these risks and how the built-in platform security mechanisms for Android and Apple for the chosen subset of OWASP vulnerabilities compare when placed side-by-side.
Authors and Affiliations
Vanessa M. Santana, Paolina Centonze
A Survey on Intelligent Water Drop Algorithm
In the optimization areas, there are different algorithms that have been applied such as swarm intelligence algorithms. The researchers have found different algorithms by simulating the behaviors of various swarms of ins...
Developing a Genetic Fuzzy System Model for Cost-Benefit Analysis.
Cost benefit analysis is a systematic approach for calculation and analyzing the cost of a project. Soft computing approaches are also applicable to deal with cost benefit analysis. In this paper Mamdani fuzzy system has...
Nano Topological Analysis For Power System Control
In this paper,we introduce an approach for analysis of information concerning electrical power system. The suggested method is a result of hybridizing rough set concepts with nano topology constructed on the set of all d...
Nature Inspired Load Balancing Algorithms in a Cloud Computing Environment
Cloud computing is a general term for anything that involves delivering hosted services over the Internet, One of the primary issues in cloud computing is implementation of a novel load balancing approach. The demanding...
Comparing the impact of Clustering with Content Based Image Retrieval Approaches for Plant Identification
Contour Based retrieval of images is an active and challenging field of research. Â Among various parameters available for contour based image retrieval, shape is considered an important aspect because it is closest to t...