Detection of SSL/TLS Implementation Errors in Android Applications
نویسندگان
چکیده
Security Socket Layer (SSL) / Transport (TLS) protocols are utilized to secure network communication (e.g., transmitting user data). Failing properly implement SSL/TLS configuration during the app development results in security risks. The weak implementations include trusting all host names, certificates, ignoring certificate verification errors, even lack of SSL public key pinning usage. These unsecured may cause Man-In-The-Middle (MITM) attacks. major aim this research is detect errors implementation Android apps. We combine existing open-source tools and streamline analysis process with combination automated static dynamic manual assistance. scan for four types vulnerabilities phase verify misuse phase. essential eliminating false positives generated at stage. analyze 109 apps from Google Play Store experimental show that 45 (41.28%) contain potential application SSL/TLS. 19 (17.43%) out vulnerable MITM
منابع مشابه
Piracy Detection App of Android Applications
Rapid increase of Smartphone users worldwide has moved developers attention towards Mobile platform to create applications for Smartphone. Android is one such major mobile platform and also an open source operating system. With the rapid increase in the android applications some undesirable apps begin to show up. Two kinds of such apps are pirated and malware. This focuses on piracy of applicat...
متن کاملcollocation errors in translations of the holy quran
the present study aims at identifying, classifying and analyzing collocation errors made by translators of the holy quran into english.findings indicated that collocationally the most acceptablt translation was done by ivring but the least appropriate one made by pickthall.
Analysis and Detection of Malicious Behaviors in Repackaged Android Applications
Context Over the past decades malware authorship grew to become a profession. Nowadays, there exists a plethora of malware instances that span various targets, structures, motivations, and objectives [1]. Despite the different objectives they pursue, the majority of malware authors strive to prolong the period of time their instances remain operational within the infected system. In this contex...
متن کاملAutomatic detection of inter-application permission leaks in Android applications
Due to their growing prevalence, smartphones can access an increasing amount of sensitive user information. To better protect this information, modern mobile operating systems provide permission-based security, which restricts applications to only access a clearly defined subset of system APIs and user data. The Android operating system builds upon already successful permission systems, but com...
متن کاملSecurity in Android Applications
The ubiquity of smartphones, and their very broad capabilities and usage, make the security of these devices tremendously important. Unfortunately, despite all progress in security and privacy mechanisms, vulnerabilities continue to proliferate. Research has shown that many vulnerabilities are due to insecure programming practices. However, each study has often dealt with a specific issue, maki...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Gazi Üniversitesi Fen Bilimleri dergisi
سال: 2021
ISSN: ['2147-9526']
DOI: https://doi.org/10.29109/gujsc.878053