[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Alanda et al., 2020 - Google Patents

Mobile application security penetration testing based on OWASP

Alanda et al., 2020

View PDF
Document ID
3757844943584795766
Author
Alanda A
Satria D
Mooduto H
Kurniawan B
Publication year
Publication venue
IOP Conference Series: Materials Science and Engineering

External Links

Snippet

Evolution of smartphones and smart devices affected one of the most used operating systems on smartphones and smart device is Android. Android growth with fast and affected the growth of applications used by that operating system. That application developed by …
Continue reading at iopscience.iop.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Alanda et al. Mobile application security penetration testing based on OWASP
Torkura et al. Continuous auditing and threat detection in multi-cloud infrastructure
Zhang et al. Understanding the (in) security of cross-side face verification systems in mobile apps: a system perspective
CN109740319B (en) Digital identity verification method and server
Borja et al. Risk analysis and Android application penetration testing based on OWASP 2016
Orjiude et al. A multilateral privacy impact analysis method for android applications
Ashari et al. Security Audit for Vulnerability Detection and Mitigation of UPT Integrated Laboratory (ILab) ITERA Website Based on OWASP Zed Attack Proxy (ZAP)
Kusreynada et al. Android Apps Vulnerability Detection with Static and Dynamic Analysis Approach using MOBSF
He et al. Understanding mobile banking applications’ security risks through blog mining and the workflow technology
Zarichuk Security in cloud computing: Methods for ensuring privacy and integration in modern applications
Khubrani Mobile Device Forensics, challenges and Blockchain-based Solution
Szczepanik et al. Security of mobile banking applications
García et al. Digital onboarding in finance: a novel model and related cybersecurity risks
Anwar et al. The Application of Mobile Security Framework (MOBSF) and Mobile Application Security Testing Guide to Ensure the Security in Mobile Commerce Applications
Pratama et al. Penetration Testing on Web Application Using Insecure Direct Object References (IDOR) Method
Sun et al. On the Development of a Protection Profile Module for Encryption Key Management Components
Judy Flava Survey of Triangle Security in Cloud
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Bitar et al. Gdpr: Securing personal data in compliance with new eu-regulations
Diaz-Piraquive et al. Knowledge management applied in the comparative study of the IRETE intrusion methodology to access to the computer systems
Tsobdjou et al. A Framework for Security Assessment of Android Mobile Banking Applications
Rus NAISS: Network Authentication of Images to Stop e-Skimmers
Mardjan et al. Open Reference Architecture for Security and Privacy Documentation
Huo et al. Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow
Shruthi et al. Android Device or a Privacy Compromise?