SlideShare a Scribd company logo
A Developer-Centric Study Exploring Mobile
Application Security Practices and Challenges
Anthony Peruma, Timothy Huo, Ana Catarina Araújo, Jake Imanaka, Rick Kazman
International Conference on Software Maintenance and Evolution
October 2024 | Flagstaff, AZ, United States
The Mobile App Landscape
4+ Million Apps
on major app stores
https://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-app-store-downloads https://www-statista.com/forecasts/1262892/mobile-app-revenue-worldwide-by-segment
257 Billion
app downloads in 2023
$467 Billion
mobile app revenue in 2023
https://www-statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores
There's an app for that!
Morning Coffee Finding Love Everything Else
From our morning routines to our social lives, apps
have become an integral part of our daily existence
There's an app for that!
Starbucks
(2014)
Tinder
(2018)
Android Apps
(2024)
Stored user credentials
in plain text
Transmitted user images
unencrypted
Path traversal vulnerability
in multiple apps
• Mining software repositories
• Reverse engineering distribution
packages
• Implementing security-specific tools
• Examining specific domains
• Lack of comprehensive developer
perspective
• Limited understanding of real-world
practices
• Outdated insights
(last major study in 2014)
Existing Research Research Gap
Existing Work
Understand
Real-world practices and challenges
Discover
Sources influencing app security practices
Insight
Gaps in mobile app security education
Research Objectives
STUDY DESIGN
07
137 completed
responses
600 invitations
No compensation
Anonymous
No follow-ups
Keyword search
Manual profilereview
24 survey questions
Results
Participant Demographics
● 137 participants from 22 countries
● 92.70% employed (116 full-time)
● Majority have 3+ years of general programming experience (123 participants)
Most of the
time
27%
All of the
time
58%
Other
15%
JOB INVOLVEMENT IN MOBILE APP
DEVELOPMENT
< 1 year
4%
6–10 years
23%
3–5 years
46%
1–2 years
13%
> 10 years
14%
MOBILE APP DEVELOPMENT EXPERIENCE
RQ 1 – Features, Practices, and Challenges
Other
28%
Extremely
important
29%
Very
important
43%
IMPORTANCE OF MOBILE APP SECURITY
DURING DEVELOPMENT
0 20 40 60 80 100 120
Authentication
Permissions
Secure Storage
Data Encryption
Participants
COMMONLY IMPLEMENTED SECURITY FEATURES
98% consider security as important
➢ 72.27% consider security very or
extremely important
RQ 1 – Features, Practices, and Challenges
50.66%
Adhere to secure
coding practices
25.11%
Use security
testing tools
21.15%
Conduct regular
security audits
34.07%
Regularly update
dependencies
12.22%
Use vulnerability
scanners
39.26%
Use trusted
libraries
RQ 1 – Features, Practices, and Challenges
0 10 20 30 40 50 60 70 80
Limited security resources
Balancing security and UX
Third-party vulnerabilities
Managing permissions
Reverse engineering protection
Participants
COMMONLY SECURITY CHALLENGES
Developers face both
technical and non-
technical challenges in
securing their apps.
RQ 2 – Mobile App Security Resources
Official
Documentation
Online Articles,
Videos, Blogs
Security-Specific
Documentation
Generative AI
Chatbots
Books & Research
Publications
Internal Organizational
Resources
Online
Forums
RQ 3 - Effectiveness of Learning Materials
Developers Report Inadequate
Mobile App Security Education
59%
RQ 3 - Effectiveness of Learning Materials
Learning Gaps in Mobile App Security:
Focus on Basic Functionality
“Most of the online materials are more
focused on the UI design”
Need for Specialized Courses
“If you wanna learn about security you need to
search for a specific course about it”
Outdated or Incomplete Materials
“The documentation didn’t explain certain
specific topics”
Security as a Secondary Concern
“Developing mobile apps was just starting so
security was not a priority”
Reliance on Platform-Specific Security Features
“On iOS, by nature of the platform you are forced to be
aware of certain security features”
On The Job Learning
“When I started working on real projects
my mentor at the company started to
suggest me best practices”
RQ 3 - Developer Recommendations
Continuous
Learning
Proactive Security
Integration
Use Trusted Libraries
and Security Tools
Prioritize Data
Protection
Involve Security
Professionals
Follow Best Practices
and Standards
Gain Hands-on
Experience
Continuous Maintenance
and Testing
Knowledge
Sharing
Key Implications of Our Research
Need for improved security education and training in mobile app development
Disconnect: Security Importance vs. Developer Preparedness
Need for a holistic, security-driven development approach throughout the SDLC
Adopting Security-Driven Development
Organizations should establish comprehensive online Security Resource Centers
Organizational Security Resource Centers
Mahalo!
(Thank You!)
PREPRINT
A Developer-Centric Study Exploring Mobile Application Security Practices and Challenges

More Related Content

PDF
Securing Mobile Apps - Appfest Version
PDF
How to Improve Your Mobile App Security Knowledge
PDF
Top Practices You Need To Develop Secure Mobile Apps.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Mobile App Security_ Best Practices to Protect Your App.pdf
PDF
How to Build Secure Mobile Apps.pdf
PDF
Mobile App Security: Essential Guide to Protecting Your App and Data
PDF
Unicom Conference - Mobile Application Security
Securing Mobile Apps - Appfest Version
How to Improve Your Mobile App Security Knowledge
Top Practices You Need To Develop Secure Mobile Apps.
Mobile App Security Testing_ A Comprehensive Guide.pdf
Mobile App Security_ Best Practices to Protect Your App.pdf
How to Build Secure Mobile Apps.pdf
Mobile App Security: Essential Guide to Protecting Your App and Data
Unicom Conference - Mobile Application Security

Similar to A Developer-Centric Study Exploring Mobile Application Security Practices and Challenges (20)

PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
PPTX
Developing Secure Apps
PPTX
Mobile App Security: Enterprise Checklist
PDF
Mobile App Development Company Singapore.pdf
PPTX
Transforming Risky Mobile Apps into Self Defending Apps
PDF
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
PDF
Importance Of Testing Mobile Apps For Security Vulnerabilities.pdf
PDF
Mobile security chess board - attacks & defense
PDF
Best Practices for Mobile App Security - Logiquad
PDF
Challenges in Testing Mobile App Security
PDF
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
PPTX
Achieving quality contraints
PDF
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
PPTX
Security as a top of mind issue for mobile application development
PDF
Building secure mobile apps
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PDF
Android App Hacking - Erez Metula, AppSec
PDF
5 Mobile App Security MUST-DOs in 2018
ODP
Mobile Apps Security Testing -1
PDF
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Developing Secure Apps
Mobile App Security: Enterprise Checklist
Mobile App Development Company Singapore.pdf
Transforming Risky Mobile Apps into Self Defending Apps
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
Importance Of Testing Mobile Apps For Security Vulnerabilities.pdf
Mobile security chess board - attacks & defense
Best Practices for Mobile App Security - Logiquad
Challenges in Testing Mobile App Security
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
Achieving quality contraints
Understanding Mobile App Security Testing_ What It Is and How to Perform It.pdf
Security as a top of mind issue for mobile application development
Building secure mobile apps
Application Hackers Have A Handbook. Why Shouldn't You?
Android App Hacking - Erez Metula, AppSec
5 Mobile App Security MUST-DOs in 2018
Mobile Apps Security Testing -1
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
Ad

More from University of Hawai‘i at Mānoa (20)

PDF
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
PDF
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
PDF
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
PDF
Mobile App Security Trends and Topics: An Examination of Questions From Stack...
PDF
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
PDF
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
PDF
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
PDF
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
PDF
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
PDF
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
PDF
A Primer on High-Quality Identifier Naming [ASE 2022]
PDF
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
PDF
Preparing for the Academic Job Market: Experience and Tips from a Recent F...
PDF
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
PDF
A Primer on High-Quality Identifier Naming
PDF
Test Anti-Patterns: From Definition to Detection
PDF
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
PDF
Understanding Digits in Identifier Names: An Exploratory Study
PDF
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
PDF
IDEAL: An Open-Source Identifier Name Appraisal Tool
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
Mobile App Security Trends and Topics: An Examination of Questions From Stack...
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
A Primer on High-Quality Identifier Naming [ASE 2022]
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
Preparing for the Academic Job Market: Experience and Tips from a Recent F...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
A Primer on High-Quality Identifier Naming
Test Anti-Patterns: From Definition to Detection
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Understanding Digits in Identifier Names: An Exploratory Study
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
IDEAL: An Open-Source Identifier Name Appraisal Tool
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
ai tools demonstartion for schools and inter college
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Transform Your Business with a Software ERP System
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
AI in Product Development-omnex systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41
CHAPTER 2 - PM Management and IT Context
ISO 45001 Occupational Health and Safety Management System
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
ai tools demonstartion for schools and inter college
Which alternative to Crystal Reports is best for small or large businesses.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
top salesforce developer skills in 2025.pdf
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Transform Your Business with a Software ERP System
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
VVF-Customer-Presentation2025-Ver1.9.pptx
Design an Analysis of Algorithms II-SECS-1021-03
Design an Analysis of Algorithms I-SECS-1021-03
2025 Textile ERP Trends: SAP, Odoo & Oracle
AI in Product Development-omnex systems

A Developer-Centric Study Exploring Mobile Application Security Practices and Challenges

  • 1. A Developer-Centric Study Exploring Mobile Application Security Practices and Challenges Anthony Peruma, Timothy Huo, Ana Catarina Araújo, Jake Imanaka, Rick Kazman International Conference on Software Maintenance and Evolution October 2024 | Flagstaff, AZ, United States
  • 2. The Mobile App Landscape 4+ Million Apps on major app stores https://www.statista.com/statistics/271644/worldwide-free-and-paid-mobile-app-store-downloads https://www-statista.com/forecasts/1262892/mobile-app-revenue-worldwide-by-segment 257 Billion app downloads in 2023 $467 Billion mobile app revenue in 2023 https://www-statista.com/statistics/276623/number-of-apps-available-in-leading-app-stores
  • 3. There's an app for that! Morning Coffee Finding Love Everything Else From our morning routines to our social lives, apps have become an integral part of our daily existence
  • 4. There's an app for that! Starbucks (2014) Tinder (2018) Android Apps (2024) Stored user credentials in plain text Transmitted user images unencrypted Path traversal vulnerability in multiple apps
  • 5. • Mining software repositories • Reverse engineering distribution packages • Implementing security-specific tools • Examining specific domains • Lack of comprehensive developer perspective • Limited understanding of real-world practices • Outdated insights (last major study in 2014) Existing Research Research Gap Existing Work
  • 6. Understand Real-world practices and challenges Discover Sources influencing app security practices Insight Gaps in mobile app security education Research Objectives
  • 7. STUDY DESIGN 07 137 completed responses 600 invitations No compensation Anonymous No follow-ups Keyword search Manual profilereview 24 survey questions
  • 9. Participant Demographics ● 137 participants from 22 countries ● 92.70% employed (116 full-time) ● Majority have 3+ years of general programming experience (123 participants) Most of the time 27% All of the time 58% Other 15% JOB INVOLVEMENT IN MOBILE APP DEVELOPMENT < 1 year 4% 6–10 years 23% 3–5 years 46% 1–2 years 13% > 10 years 14% MOBILE APP DEVELOPMENT EXPERIENCE
  • 10. RQ 1 – Features, Practices, and Challenges Other 28% Extremely important 29% Very important 43% IMPORTANCE OF MOBILE APP SECURITY DURING DEVELOPMENT 0 20 40 60 80 100 120 Authentication Permissions Secure Storage Data Encryption Participants COMMONLY IMPLEMENTED SECURITY FEATURES 98% consider security as important ➢ 72.27% consider security very or extremely important
  • 11. RQ 1 – Features, Practices, and Challenges 50.66% Adhere to secure coding practices 25.11% Use security testing tools 21.15% Conduct regular security audits 34.07% Regularly update dependencies 12.22% Use vulnerability scanners 39.26% Use trusted libraries
  • 12. RQ 1 – Features, Practices, and Challenges 0 10 20 30 40 50 60 70 80 Limited security resources Balancing security and UX Third-party vulnerabilities Managing permissions Reverse engineering protection Participants COMMONLY SECURITY CHALLENGES Developers face both technical and non- technical challenges in securing their apps.
  • 13. RQ 2 – Mobile App Security Resources Official Documentation Online Articles, Videos, Blogs Security-Specific Documentation Generative AI Chatbots Books & Research Publications Internal Organizational Resources Online Forums
  • 14. RQ 3 - Effectiveness of Learning Materials Developers Report Inadequate Mobile App Security Education 59%
  • 15. RQ 3 - Effectiveness of Learning Materials Learning Gaps in Mobile App Security: Focus on Basic Functionality “Most of the online materials are more focused on the UI design” Need for Specialized Courses “If you wanna learn about security you need to search for a specific course about it” Outdated or Incomplete Materials “The documentation didn’t explain certain specific topics” Security as a Secondary Concern “Developing mobile apps was just starting so security was not a priority” Reliance on Platform-Specific Security Features “On iOS, by nature of the platform you are forced to be aware of certain security features” On The Job Learning “When I started working on real projects my mentor at the company started to suggest me best practices”
  • 16. RQ 3 - Developer Recommendations Continuous Learning Proactive Security Integration Use Trusted Libraries and Security Tools Prioritize Data Protection Involve Security Professionals Follow Best Practices and Standards Gain Hands-on Experience Continuous Maintenance and Testing Knowledge Sharing
  • 17. Key Implications of Our Research Need for improved security education and training in mobile app development Disconnect: Security Importance vs. Developer Preparedness Need for a holistic, security-driven development approach throughout the SDLC Adopting Security-Driven Development Organizations should establish comprehensive online Security Resource Centers Organizational Security Resource Centers