SlideShare a Scribd company logo
Security Best Practices
MOBILE APPS
<CodeRed> Talks
Kadhambari Anbalagan, Software Architect
5:00pm Monday, 8 April, 2017
RedBlackTree Terrace
What do the statistics say?
Popular Free App Findings
Among top 20 free apps, 80% of Android and 75% of iOS apps have been subjected to hacking.
Top Paid Apps Findings
Research reveals, among top 100 paid apps, 97% of Android and 87% of iOS apps have been
subjected to hacking.
<CodeRed> Talks
Reason?
Apps that we
build are Insecure
<CodeRed> Talks
Mobile App Security Issues
• Improper Platform usage
• Insecure data
• Insecure communication
• Insecure Authentication
• Insufficient Cryptography
• Insecure Authorization
• Code Quality Issues
• Code Tampering
• Reverse Engineering
• Extraneous functionality
<CodeRed> Talks
Improper Platform Usage
Misuse of platform feature or lack of platform security controls for the android or IOS operating
system
What can happen?
1. Improper implementation of android Intents - Data leakage, restricted functions being called and
program flow being manipulated
2. Using Keychain for secure data storage - In several scenarios, the keychain can be compromised
and decrypted
Best Practices
Know your platform well
Use intents carefully
Use the keychain carefully
<CodeRed> Talks
Insecure Data
Vulnerabilities that leak personal information and provide access to hackers
Report By NowSecure:
1 in 10 Mobile app leak private, sensitive data like email, username or password.
Best Practices
• When possible, do not store/cache data
• Implement secure data storage
• Securely store data only in RAM
• Encryption using verified third party libraries
<CodeRed> Talks
Insecure Communication
Communication being sent in clear text as well as other insecure methods.
Real World Example:
Best Practices
• Implement secure transmission of sensitive data
• Use SSL/TLS or for increased security implement certificate pinning
• Leverage app layer encryption to protect user data
<CodeRed> Talks<CodeRed> Talks
Insecure Authentication
Inability to Securely identify a user and maintain that user’s identity
Real World Example:
Best Practices
• Use token based Authentication
<CodeRed> Talks
Insufficient Cryptography
• Process behind encryption and decryption may allow a hacker to decrypt sensitive data.
• Algorithm behind encryption and decryption may be weak in nature.
Vulnerable?
• Poor key management processes
• Use of custom encryption protocols
• Use of insecure algorithms
Best Practices
• Implement secure data storage
• Avoid custom encryption methods and use proven encryption algorithm and methods
• Avoid storage of sensitive information on mobile
• NIST guidelines on recommended algorithms
<CodeRed> Talks
Insecure Authorization
Failure of a server to properly enforce identity and permissions as stated by the mobile app
Best Practices
• Verify the roles and permissions of the authenticated user using only information contained in
backend systems. Avoid relying on any roles or permission information that comes from the
mobile device itself
<CodeRed> Talks
Client code Quality
Risks that come from vulnerabilities like buffer overflows, format string vulnerabilities and various code level mistakes
Real World Example:
Vitamio SDK – Used in thousands of mobile apps. Have millions of app downloads.
In another instance high risk man in the middle vulnerability identified in one of the third party library used in an app.
What to do ?
• Avoid third party libraries with high risk flaws
•Maintain consistent coding patterns
•Write well documented and easily readable code
•Via automation, identify buffer overflows and memory leaks through the use of third-party static analysis tools;
<CodeRed> Talks
Code Tampering
When attackers tamper with or install a backdoor on an app, re-sign it and publish the malicious
version to third party app marketplaces.
Popular Example:
What to Do?
• implement anti tampering techniques such as checksums, digital signatures and other validation
mechanisms to help detect file tampering
<CodeRed> Talks
Reverse Engineering
Analysis of a final binary to determine its source code, libraries, algorithms and more.
Real World Example:
Hackers decompiled mobile app and recompiled it so they dint have to pay for premium content.
What to Do?
• Increase code complexity and use obfuscation
<CodeRed> Talks
Extraneous Functionality
• Developers frequently include hidden backdoors or security controls they do not plan on releasing
into production
• This error creates risk when a feature is released to the wild that was never intended to be shared
Real World example:
What to do?
• Carefully manage debug logs
• Clean coding practices
<CodeRed> Talks
Thank You

More Related Content

PDF
Deception Technology: Use Cases & Implementation Approaches
PDF
Security precognition chaos engineering in incident response
PDF
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
PDF
Leveraging red for defense
PPTX
Understanding Application Threat Modelling & Architecture
PDF
The Rise of the Purple Team
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Deception Technology: Use Cases & Implementation Approaches
Security precognition chaos engineering in incident response
Asegurarme de la Seguridad?, Un Vistazo al Penetration Testing
Leveraging red for defense
Understanding Application Threat Modelling & Architecture
The Rise of the Purple Team
Jim Wojno: Incident Response - No Pain, No Gain!
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited

What's hot (20)

PPS
Security testing
PPTX
Continuous Automated Red Teaming (CART) - Bikash Barai
PPTX
Cyber Resiliency
PDF
Evil User Stories - Improve Your Application Security
PPT
Security testing
PDF
Advanced red teaming all your badges are belong to us
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Penetration testing & Ethical Hacking
PDF
PIE - BSides Vancouver 2018
PPTX
Ethical hacking/ Penetration Testing
PDF
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
PPTX
OWASP Mobile TOP 10 2014
PDF
Android security testing
PPTX
Security Testing
PPTX
Covert channels: A Window of Data Exfiltration Opportunities
PPTX
Network Situational Awareness using Tripwire IP360
PPTX
What is security testing and why it is so important?
PDF
Security Testing for Test Professionals
PPTX
Career In Information security
Security testing
Continuous Automated Red Teaming (CART) - Bikash Barai
Cyber Resiliency
Evil User Stories - Improve Your Application Security
Security testing
Advanced red teaming all your badges are belong to us
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Wfh security risks - Ed Adams, President, Security Innovation
Penetration testing & Ethical Hacking
PIE - BSides Vancouver 2018
Ethical hacking/ Penetration Testing
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
OWASP Mobile TOP 10 2014
Android security testing
Security Testing
Covert channels: A Window of Data Exfiltration Opportunities
Network Situational Awareness using Tripwire IP360
What is security testing and why it is so important?
Security Testing for Test Professionals
Career In Information security
Ad

Similar to Mobile App Security - Best Practices (20)

PPTX
Fragments-Plug the vulnerabilities in your App
PDF
How to Build Secure Mobile Apps.pdf
PDF
OWASP Mobile Top 10
PDF
Android App Hacking - Erez Metula, AppSec
PDF
CNIT 128 8: Mobile development security
PDF
Application Security framework for Mobile App Development in Enterprise Setup
PDF
Tips and Tricks for Building Secure Mobile Apps
PPTX
Mobile App Security: Enterprise Checklist
PDF
Top Practices You Need To Develop Secure Mobile Apps.
PDF
OWASP Day - OWASP Day - Lets secure!
DOCX
Webinar Security: Apps of Steel transcription
PDF
Mobile Apps and Security Attacks: An Introduction
PDF
Tips and Tricks for Building Secure Mobile Apps
PDF
OWASP Mobile Security: Top 10 Risks for 2017
PDF
Is my app secure?
PDF
Is My App Secure ?
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
Unicom Conference - Mobile Application Security
PDF
Mobile Defense-in-Dev (Depth)
PDF
Securing Mobile Apps - Appfest Version
Fragments-Plug the vulnerabilities in your App
How to Build Secure Mobile Apps.pdf
OWASP Mobile Top 10
Android App Hacking - Erez Metula, AppSec
CNIT 128 8: Mobile development security
Application Security framework for Mobile App Development in Enterprise Setup
Tips and Tricks for Building Secure Mobile Apps
Mobile App Security: Enterprise Checklist
Top Practices You Need To Develop Secure Mobile Apps.
OWASP Day - OWASP Day - Lets secure!
Webinar Security: Apps of Steel transcription
Mobile Apps and Security Attacks: An Introduction
Tips and Tricks for Building Secure Mobile Apps
OWASP Mobile Security: Top 10 Risks for 2017
Is my app secure?
Is My App Secure ?
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Unicom Conference - Mobile Application Security
Mobile Defense-in-Dev (Depth)
Securing Mobile Apps - Appfest Version
Ad

More from RedBlackTree (8)

PDF
An Introduction to Druid
PPTX
The Mobile ToolChain with Fastlane - Code Red Talk at RedBlackTree
PDF
Navigation in React Native
PDF
Introduction to React Native
PPTX
Couchbase Chennai Meetup 2 - Couchbase - Mobile
PPTX
Couchbase Chennai Meetup 2 - Big Data & Analytics
PPTX
Performance testing with Apache JMeter
PDF
An Introduction to Couchbase Mobile
An Introduction to Druid
The Mobile ToolChain with Fastlane - Code Red Talk at RedBlackTree
Navigation in React Native
Introduction to React Native
Couchbase Chennai Meetup 2 - Couchbase - Mobile
Couchbase Chennai Meetup 2 - Big Data & Analytics
Performance testing with Apache JMeter
An Introduction to Couchbase Mobile

Recently uploaded (20)

PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
history of c programming in notes for students .pptx
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
PDF
Download FL Studio Crack Latest version 2025 ?
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Digital Systems & Binary Numbers (comprehensive )
17 Powerful Integrations Your Next-Gen MLM Software Needs
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Advanced SystemCare Ultimate Crack + Portable (2025)
Designing Intelligence for the Shop Floor.pdf
Why Generative AI is the Future of Content, Code & Creativity?
Reimagine Home Health with the Power of Agentic AI​
Internet Downloader Manager (IDM) Crack 6.42 Build 41
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
history of c programming in notes for students .pptx
iTop VPN Crack Latest Version Full Key 2025
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
CapCut Video Editor 6.8.1 Crack for PC Latest Download (Fully Activated) 2025
Download FL Studio Crack Latest version 2025 ?

Mobile App Security - Best Practices

  • 1. Security Best Practices MOBILE APPS <CodeRed> Talks Kadhambari Anbalagan, Software Architect 5:00pm Monday, 8 April, 2017 RedBlackTree Terrace
  • 2. What do the statistics say? Popular Free App Findings Among top 20 free apps, 80% of Android and 75% of iOS apps have been subjected to hacking. Top Paid Apps Findings Research reveals, among top 100 paid apps, 97% of Android and 87% of iOS apps have been subjected to hacking. <CodeRed> Talks
  • 3. Reason? Apps that we build are Insecure <CodeRed> Talks
  • 4. Mobile App Security Issues • Improper Platform usage • Insecure data • Insecure communication • Insecure Authentication • Insufficient Cryptography • Insecure Authorization • Code Quality Issues • Code Tampering • Reverse Engineering • Extraneous functionality <CodeRed> Talks
  • 5. Improper Platform Usage Misuse of platform feature or lack of platform security controls for the android or IOS operating system What can happen? 1. Improper implementation of android Intents - Data leakage, restricted functions being called and program flow being manipulated 2. Using Keychain for secure data storage - In several scenarios, the keychain can be compromised and decrypted Best Practices Know your platform well Use intents carefully Use the keychain carefully <CodeRed> Talks
  • 6. Insecure Data Vulnerabilities that leak personal information and provide access to hackers Report By NowSecure: 1 in 10 Mobile app leak private, sensitive data like email, username or password. Best Practices • When possible, do not store/cache data • Implement secure data storage • Securely store data only in RAM • Encryption using verified third party libraries <CodeRed> Talks
  • 7. Insecure Communication Communication being sent in clear text as well as other insecure methods. Real World Example: Best Practices • Implement secure transmission of sensitive data • Use SSL/TLS or for increased security implement certificate pinning • Leverage app layer encryption to protect user data <CodeRed> Talks<CodeRed> Talks
  • 8. Insecure Authentication Inability to Securely identify a user and maintain that user’s identity Real World Example: Best Practices • Use token based Authentication <CodeRed> Talks
  • 9. Insufficient Cryptography • Process behind encryption and decryption may allow a hacker to decrypt sensitive data. • Algorithm behind encryption and decryption may be weak in nature. Vulnerable? • Poor key management processes • Use of custom encryption protocols • Use of insecure algorithms Best Practices • Implement secure data storage • Avoid custom encryption methods and use proven encryption algorithm and methods • Avoid storage of sensitive information on mobile • NIST guidelines on recommended algorithms <CodeRed> Talks
  • 10. Insecure Authorization Failure of a server to properly enforce identity and permissions as stated by the mobile app Best Practices • Verify the roles and permissions of the authenticated user using only information contained in backend systems. Avoid relying on any roles or permission information that comes from the mobile device itself <CodeRed> Talks
  • 11. Client code Quality Risks that come from vulnerabilities like buffer overflows, format string vulnerabilities and various code level mistakes Real World Example: Vitamio SDK – Used in thousands of mobile apps. Have millions of app downloads. In another instance high risk man in the middle vulnerability identified in one of the third party library used in an app. What to do ? • Avoid third party libraries with high risk flaws •Maintain consistent coding patterns •Write well documented and easily readable code •Via automation, identify buffer overflows and memory leaks through the use of third-party static analysis tools; <CodeRed> Talks
  • 12. Code Tampering When attackers tamper with or install a backdoor on an app, re-sign it and publish the malicious version to third party app marketplaces. Popular Example: What to Do? • implement anti tampering techniques such as checksums, digital signatures and other validation mechanisms to help detect file tampering <CodeRed> Talks
  • 13. Reverse Engineering Analysis of a final binary to determine its source code, libraries, algorithms and more. Real World Example: Hackers decompiled mobile app and recompiled it so they dint have to pay for premium content. What to Do? • Increase code complexity and use obfuscation <CodeRed> Talks
  • 14. Extraneous Functionality • Developers frequently include hidden backdoors or security controls they do not plan on releasing into production • This error creates risk when a feature is released to the wild that was never intended to be shared Real World example: What to do? • Carefully manage debug logs • Clean coding practices <CodeRed> Talks