Secure Development Strategy Model Framework for Security of Mobile Applications

被引:0
作者
Poniszewska-Maranda, Aneta [1 ]
Chomatek, Lukasz [1 ]
Ochelska-Mierzejewska, Joanna [1 ]
机构
[1] Lodz Univ Technol, Inst Informat Technol, Lodz, Poland
来源
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021) | 2021年
关键词
mobile application development; security of mobile applications; secure development strategy model; access control model; security framework;
D O I
10.1109/TrustCom53373.2021.00178
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing popularity of mobile technologies and mobile systems, especially Android system, brings many possibilities. Using the mobile application, it is possible to make bank transfers, communicate with patients for applications used in medicine and many others. Popularity, unfortunately, also brings many risks. With the development of the Internet and information technology, the range of opportunities for cyber-criminals has developed. With the increasing popularity of systems and mobile devices, we can also observe an increase in attacks and the number of malicious software targeted for these technologies. The development of the mobile application fulfills more and more important role in the everyday lives of the visibly growing number of smartphone and tablet users, especially from the point of view of security aspects. The paper presents an outline of the proposed secure development model to overcome the existing threats faced by the mobile application developers and its implementation in the form of the mobile security framework.
引用
收藏
页码:1294 / 1299
页数:6
相关论文
共 17 条
  • [1] Enhancing the Security of Mobile Applications by using TEE and (U)SIM
    Ahmad, Zaheer
    Francis, Lishoy
    Ahmed, Tansir
    Lobodzinski, Christopher
    Audsin, Dev
    Jiang, Peng
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 575 - 582
  • [2] Alhamed M, 2013, 2013 1ST INTERNATIONAL WORKSHOP ON THE ENGINEERING OF MOBILE-ENABLED SYSTEMS (MOBS), P36, DOI 10.1109/MOBS.2013.6614221
  • [3] [Anonymous], 2011, USENIX SEC S
  • [4] [Anonymous], 2013, PSIOS BRING YOUR OWN
  • [5] [Anonymous], 2013, Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys'13, page, DOI DOI 10.1145/2462456.2464460
  • [6] [Anonymous], 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
  • [7] [Anonymous], 2012, INT C CYBER SECURITY
  • [8] Apple, 2014, IOS SEC
  • [9] Egele M., 2011, PIOS DETECTING PRIVA
  • [10] MASON: Mobile autonomic security for network access controls
    Fitzgerald, William M.
    Neville, Ultan
    Foley, Simon N.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (01) : 14 - 29