Mobile software security threats in the software ecosystem, a call to Arms

Andrey Krupskiy*, Remmelt Blessinga, Jelmer Scholte, Slinger Jansen

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Abstract

    This paper studies security policies of the Android and iOS software ecosystems. These platforms have experienced security issues since their public release in 2007. This research creates an overview of the results that security issues cause and the actions available to limit security infractions based on scientific literature. Following the overview, this paper attempts to explain premises of those issues by analyzing the security recommendations of both platforms and comparing them to OWASP security guidelines. This is done by comparing development guidelines set up by both platforms and assessing the importance of each of these guidelines in the ecosystem perspective. The conclusion highlights vulnerabilities in the developer guidelines of mobile platforms and recommends appropriate action to improve the situation.

    Original languageEnglish
    Title of host publicationSoftware Business - 8th International Conference, ICSOB 2017, Proceedings
    EditorsKarl Werder, Arto Ojala, Helena Holmstrom Olsson
    PublisherSpringer
    Pages161-175
    Number of pages15
    ISBN (Print)9783319691909
    DOIs
    Publication statusPublished - 2017
    Event8th International Conference on Software Business, ICSOB 2017 - Essen, Germany
    Duration: 12 Jun 201713 Jun 2017

    Publication series

    NameLecture Notes in Business Information Processing
    Volume304
    ISSN (Print)1865-1348

    Conference

    Conference8th International Conference on Software Business, ICSOB 2017
    Country/TerritoryGermany
    CityEssen
    Period12/06/1713/06/17

    Keywords

    • Development policies
    • OWASP
    • Software ecosystems
    • Software security

    Fingerprint

    Dive into the research topics of 'Mobile software security threats in the software ecosystem, a call to Arms'. Together they form a unique fingerprint.

    Cite this