Alanda et al., 2020 - Google Patents
Mobile application security penetration testing based on OWASPAlanda et al., 2020
View PDF- Document ID
- 3757844943584795766
- Author
- Alanda A
- Satria D
- Mooduto H
- Kurniawan B
- Publication year
- Publication venue
- IOP Conference Series: Materials Science and Engineering
External Links
Snippet
Evolution of smartphones and smart devices affected one of the most used operating systems on smartphones and smart device is Android. Android growth with fast and affected the growth of applications used by that operating system. That application developed by …
- 230000035515 penetration 0 title description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alanda et al. | Mobile application security penetration testing based on OWASP | |
Torkura et al. | Continuous auditing and threat detection in multi-cloud infrastructure | |
Zhang et al. | Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective | |
CN109740319B (en) | Digital identity verification method and server | |
Borja et al. | Risk analysis and Android application penetration testing based on OWASP 2016 | |
Orjiude et al. | A multilateral privacy impact analysis method for android applications | |
Ashari et al. | Security Audit for Vulnerability Detection and Mitigation of UPT Integrated Laboratory (ILab) ITERA Website Based on OWASP Zed Attack Proxy (ZAP) | |
Kusreynada et al. | Android Apps Vulnerability Detection with Static and Dynamic Analysis Approach using MOBSF | |
He et al. | Understanding mobile banking applications’ security risks through blog mining and the workflow technology | |
Zarichuk | Security in cloud computing: Methods for ensuring privacy and integration in modern applications | |
Khubrani | Mobile Device Forensics, challenges and Blockchain-based Solution | |
Szczepanik et al. | Security of mobile banking applications | |
García et al. | Digital onboarding in finance: a novel model and related cybersecurity risks | |
Anwar et al. | The Application of Mobile Security Framework (MOBSF) and Mobile Application Security Testing Guide to Ensure the Security in Mobile Commerce Applications | |
Pratama et al. | Penetration Testing on Web Application Using Insecure Direct Object References (IDOR) Method | |
Sun et al. | On the Development of a Protection Profile Module for Encryption Key Management Components | |
Judy Flava | Survey of Triangle Security in Cloud | |
Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
Bitar et al. | Gdpr: Securing personal data in compliance with new eu-regulations | |
Diaz-Piraquive et al. | Knowledge management applied in the comparative study of the IRETE intrusion methodology to access to the computer systems | |
Tsobdjou et al. | A Framework for Security Assessment of Android Mobile Banking Applications | |
Rus | NAISS: Network Authentication of Images to Stop e-Skimmers | |
Mardjan et al. | Open Reference Architecture for Security and Privacy Documentation | |
Huo et al. | Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow | |
Shruthi et al. | Android Device or a Privacy Compromise? |