SeMA: Extending and Analyzing Storyboards to Develop Secure Android Apps
- URL: http://arxiv.org/abs/2001.10052v4
- Date: Sun, 10 Mar 2024 18:44:57 GMT
- Title: SeMA: Extending and Analyzing Storyboards to Develop Secure Android Apps
- Authors: Joydeep Mitra, Venkatesh-Prasad Ranganath, Torben Amtoft, Mike Higgins
- Abstract summary: SeMA is a mobile app development methodology that builds on existing mobile app design artifacts such as storyboards.
An evaluation of the effectiveness of SeMA shows the methodology can detect and help prevent 49 vulnerabilities known to occur in Android apps.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Mobile apps provide various critical services, such as banking,
communication, and healthcare. To this end, they have access to our personal
information and have the ability to perform actions on our behalf. Hence,
securing mobile apps is crucial to ensuring the privacy and safety of its
users.
Recent research efforts have focused on developing solutions to secure mobile
ecosystems (i.e., app platforms, apps, and app stores), specifically in the
context of detecting vulnerabilities in Android apps. Despite this attention,
known vulnerabilities are often found in mobile apps, which can be exploited by
malicious apps to harm the user. Further, fixing vulnerabilities after
developing an app has downsides in terms of time, resources, user
inconvenience, and information loss.
In an attempt to address this concern, we have developed SeMA, a mobile app
development methodology that builds on existing mobile app design artifacts
such as storyboards. With SeMA, security is a first-class citizen in an app's
design -- app designers and developers can collaborate to specify and reason
about the security properties of an app at an abstract level without being
distracted by implementation level details. Our realization of SeMA using
Android Studio tooling demonstrates the methodology is complementary to
existing design and development practices. An evaluation of the effectiveness
of SeMA shows the methodology can detect and help prevent 49 vulnerabilities
known to occur in Android apps. Further, a usability study of the methodology
involving ten real-world developers shows the methodology is likely to reduce
the development time and help developers uncover and prevent known
vulnerabilities while designing apps.
Related papers
- Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow [10.342268145364242]
We mine Stack Overflow for questions on mobile app security, which we analyze using quantitative and qualitative techniques.
The findings reveal that Stack Overflow is a major resource for developers seeking help with mobile app security, especially for Android apps.
Insights from this research can inform the development of tools, techniques, and resources by the research and vendor community.
arXiv Detail & Related papers (2024-09-12T10:45:45Z) - A Developer-Centric Study Exploring Mobile Application Security Practices and Challenges [10.342268145364242]
This study explores the common practices and challenges that developers face in securing their apps.
Our findings show that developers place high importance on security, frequently implementing features such as authentication and secure storage.
We envision our findings leading to improved security practices, better-designed tools and resources, and more effective training programs.
arXiv Detail & Related papers (2024-08-16T22:03:06Z) - A Risk Estimation Study of Native Code Vulnerabilities in Android Applications [1.6078134198754157]
We propose a fast risk-based approach that provides a risk score related to the native part of an Android application.
We show that many applications contain well-known vulnerabilities that miscreants can potentially exploit.
arXiv Detail & Related papers (2024-06-04T06:44:07Z) - Finding Vulnerabilities in Mobile Application APIs: A Modular Programmatic Approach [0.0]
Application Programming Interfaces (APIs) are becoming increasingly popular to transfer data in a variety of mobile applications.
These APIs often process sensitive user information through their endpoints, which are potentially exploitable due to developer mis implementation.
This paper created a custom, modular endpoint vulnerability detection tool to analyze information leakage in various mobile Android applications.
arXiv Detail & Related papers (2023-10-22T00:08:51Z) - Towards a Fair Comparison and Realistic Design and Evaluation Framework
of Android Malware Detectors [63.75363908696257]
We analyze 10 influential research works on Android malware detection using a common evaluation framework.
We identify five factors that, if not taken into account when creating datasets and designing detectors, significantly affect the trained ML models.
We conclude that the studied ML-based detectors have been evaluated optimistically, which justifies the good published results.
arXiv Detail & Related papers (2022-05-25T08:28:08Z) - Analysis of Longitudinal Changes in Privacy Behavior of Android
Applications [79.71330613821037]
In this paper, we examine the trends in how Android apps have changed over time with respect to privacy.
We examine the adoption of HTTPS, whether apps scan the device for other installed apps, the use of permissions for privacy-sensitive data, and the use of unique identifiers.
We find that privacy-related behavior has improved with time as apps continue to receive updates, and that the third-party libraries used by apps are responsible for more issues with privacy.
arXiv Detail & Related papers (2021-12-28T16:21:31Z) - Android Security using NLP Techniques: A Review [1.218340575383456]
Android is among the most targeted platform by attackers.
Traditional solutions based on static and dynamic analysis have been evolving.
This study aims to explore possible research directions for future studies by presenting state-of-the-art in this domain.
arXiv Detail & Related papers (2021-07-07T08:33:00Z) - Context-Aware Target Apps Selection and Recommendation for Enhancing
Personal Mobile Assistants [42.25496752260081]
This paper addresses two research problems that are vital for developing effective personal mobile assistants: target apps selection and recommendation.
Here we focus on context-aware models to leverage the rich contextual information available to mobile devices.
We propose a family of context-aware neural models that take into account the sequential, temporal, and personal behavior of users.
arXiv Detail & Related papers (2021-01-09T17:07:47Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Emerging App Issue Identification via Online Joint Sentiment-Topic
Tracing [66.57888248681303]
We propose a novel emerging issue detection approach named MERIT.
Based on the AOBST model, we infer the topics negatively reflected in user reviews for one app version.
Experiments on popular apps from Google Play and Apple's App Store demonstrate the effectiveness of MERIT.
arXiv Detail & Related papers (2020-08-23T06:34:05Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.