SlideShare a Scribd company logo
STATE OF
APPLICATION SECURITY VOL. 4, 2015
STATE OF PIRACY
1.6M 1.96M
ASSETS IS EXPECTED
NUMBER OF PIRATED
Pirated software found between Jan. 2012 and Mar. 2015
BREAKDOWN OF SOFTWARE PIRACY
Between 2012 and 2014 the average
Android Apps
Key Generators
Apple Software
Windows Desktop
Software
Apple Apps
number of pirated assets found per year
2012-2014
AVG./YR
2015*
was 1.6M. In 2015, the total number of
41%
17%
13%
9%
5%
KEY9,000
GENERATORS
FOUND
Software that generates
product licensing keys to
enable unauthorized access to
software or digital media releases.
What are they?
APPLICATION RISKS ENABLING PIRACY
DISTRIBUTION MODEL FOR
REVERSE-ENGINEERING APPLICATION TAMPERING
With readily available tools, hackers
can quickly convert unprotected
binary code back to source-code,
repackage and distribute.
VOLUME OF PIRATED RELEASES
SPEED OF ILLEGAL DISTRIBUTION
100’s 100,000’s
0 sec 33 mins
Scene
FTP Top
Sites
Private
Torrent
Sites
Public
Sites
Cyber-
lockers
Applications can be modified or
injected with malware at run-time
to steal keys, and alter execution in
line with hacker objectives.
23.76%
OF GLOBAL INTERNET BANDWIDTH
IS CONSUMED BY TRAFFIC INFRINGING
UPON COPYRIGHT.
ECONOMIC IMPLICATIONS OF PIRACY
2
pirated assets is expected to hit 1.96M.
(Source: iThreat Cyber Group & Arxan Technologies)
TO INCREASE 22%
PIRATED SOFTWARE
IN 2014, THE UNMONETIZED
VALUE OF PIRATED ASSETS
REACHED
$836,840,300,000$652 B
$74 B $73 B
$18 B $12 B $6 B
Software Games Movies TV Music Adult
Content
UNADDRESSED APPLICATION
VULNERABILITIES
M1 Weak Server Side Controls
M2 Insecure Data Storage
M3 Insufficient Transport Layer
M4 Unintended Data Leakage
M5 Poor Authorization
M7 Client Side Injection
M9 Improper Session Handling
M10 Lack of Binary Protections
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Jan-2015 June-2015
OWASP MOBILE TOP 10
97%
OF MOBILE APPS LACK THE PROPER
BINARY PROTECTIONS, LEAVING THEM
VULNERABLE TO PIRACY.
50%
OF ORGANIZATIONS HAVE
ZERO BUDGET ALLOCATED TO
PROTECTING MOBILE APPS.
(M6 and M8 not included in analysis)
A recent study analyzed over 96,000 Android apps to measure how well they
addressed the OWASP Mobile Top 10 vulnerabilities. The graph below shows
the percentage of apps that failed to address these vulnerabilities over time.
RECOMMENDATIONS TO MITIGATE
SOFTWARE PIRACY
35%
30%
25%
20%
15%
10%
5%
Application
Layer
Data
Layer
Network
Layer
RETHINK YOUR SECURITY
INVESTMENT APPROACH
Consider how much money is spent on
application security versus other areas.
BUILD RUN-TIME PROTECTIONS
INTO YOUR APPLICATIONS
Implementing run-time protection will enable
self-defense against tampering and malware attacks.
Security Risk Spending
A 2015 study from Ponemon Institute,
sponsored by IBM Security, found that
application security spending was not
PROTECT YOUR
CRYPTOGRAPHIC KEYS
White box cryptography solutions can
mask both static and dynamic keys.
SECURITY RISKS VS. SPEND
(Source: MetaIntelli, 2015 Research)
Sources:
1. iThreat Cyber Group & Arxan Technologies
2. Study by NetNames/Envisional, sponsored by NBC Universal
3. Tru Optik, 2014 Research
4. MetaIntelli, 2015 Research
5. Ponemon Institute study, sponsored by IBM Security, Mar 2015
3
4
5
SECURITY INVESTMENTS
NOT IN LINE WITH LEVEL OF RISK
in line with the level of application risk.
For additional details
& full report, visit Arxan.com

More Related Content

PDF
State of Application Security Vol. 4
PDF
Case Closed with IBM Application Security on Cloud infographic
PDF
Infographic network protection security
PDF
Infographic: 5 Tips for Cloud Success
PDF
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
PDF
Patches Arrren't Just for Pirates
PDF
The state of mobile app security
PPTX
Mobile Security
State of Application Security Vol. 4
Case Closed with IBM Application Security on Cloud infographic
Infographic network protection security
Infographic: 5 Tips for Cloud Success
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Patches Arrren't Just for Pirates
The state of mobile app security
Mobile Security

What's hot (20)

PDF
The New NotCompatible
PDF
Relentless Mobile Threats to Avoid
PDF
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
PDF
2015 Cybersecurity Predictions
PDF
Infographic: The High Cost of BYOD
PPTX
Tips and Tricks on Securing your Android Devices
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PPTX
Mobile Protect Pro - Powered by Zimperium
PPTX
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
PDF
Feds: You have a BYOD program whether you like it or not
PDF
Five mobile security challenges facing the enterprise
PDF
Ey giss-under-cyber-attack
PPTX
How to Gather Global Mobile Threat Intelligence
PPTX
Mobile security
PDF
Infographic: Mobile At Work
PDF
5 Ways to Protect your Mobile Security
PDF
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
PDF
10940 img sytr12_mobile_malware
PDF
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
PPTX
Zimperium Global Threat Intelligence - Q2 2017
The New NotCompatible
Relentless Mobile Threats to Avoid
[Infographic] 2019: ENTERPRISE MOBILITY TRENDS, CHALLENGES & THE WAY FORWARD
2015 Cybersecurity Predictions
Infographic: The High Cost of BYOD
Tips and Tricks on Securing your Android Devices
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Protect Pro - Powered by Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Feds: You have a BYOD program whether you like it or not
Five mobile security challenges facing the enterprise
Ey giss-under-cyber-attack
How to Gather Global Mobile Threat Intelligence
Mobile security
Infographic: Mobile At Work
5 Ways to Protect your Mobile Security
INFOGRAPHIC: Top Most Dangerous Malware Trends for 2014
10940 img sytr12_mobile_malware
INFOGRAPHIC: 5 Most Dangerous Malware Trends of 2013
Zimperium Global Threat Intelligence - Q2 2017
Ad

Viewers also liked (8)

PDF
INFOGRAPHIC: Java under Attack
PPTX
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
PDF
5 Steps to Securing Your Company's Crown Jewels
PDF
How to Hack a Cryptographic Key
PPTX
Uncover What's Inside the Mind of a Hacker
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
Top 5 Things to Look for in an IPS Solution
PDF
Infographic under the hood of a connected car hack
INFOGRAPHIC: Java under Attack
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
5 Steps to Securing Your Company's Crown Jewels
How to Hack a Cryptographic Key
Uncover What's Inside the Mind of a Hacker
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Top 5 Things to Look for in an IPS Solution
Infographic under the hood of a connected car hack
Ad

Similar to State of Application Security: State of Piracy (20)

PDF
Unicom Conference - Mobile Application Security
PDF
Securing Mobile Apps - Appfest Version
PDF
Protect Your Enterprise - Check Point SandBlast Mobile
PPTX
Presentatie Kaspersky over Malware trends en statistieken, 26062015
PDF
Challenges in Testing Mobile App Security
PDF
Mobile Application Security
PPTX
Mobile Payments: Protecting Apps and Data from Emerging Risks
PDF
What are top 7 cyber security trends for 2020
PDF
En msft-scrty-cntnt-e book-cybersecurity
PDF
2016 Trends in Security
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
PDF
Unified application security analyser
PDF
How to Build Secure Mobile Apps.pdf
PPT
The unprecedented state of web insecurity
PDF
Infographic: Mobile is growing and so are security threats
PPTX
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
PPTX
Securing the Cloud
PPTX
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
PDF
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
PDF
application-security-fallacies-and-realities-veracode
Unicom Conference - Mobile Application Security
Securing Mobile Apps - Appfest Version
Protect Your Enterprise - Check Point SandBlast Mobile
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Challenges in Testing Mobile App Security
Mobile Application Security
Mobile Payments: Protecting Apps and Data from Emerging Risks
What are top 7 cyber security trends for 2020
En msft-scrty-cntnt-e book-cybersecurity
2016 Trends in Security
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Unified application security analyser
How to Build Secure Mobile Apps.pdf
The unprecedented state of web insecurity
Infographic: Mobile is growing and so are security threats
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
Securing the Cloud
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
application-security-fallacies-and-realities-veracode

More from IBM Security (20)

PPTX
Automation: Embracing the Future of SecOps
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PPTX
Integrated Response with v32 of IBM Resilient
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PDF
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PDF
WannaCry Ransomware Attack: What to Do Now
PPTX
How to Improve Threat Detection & Simplify Security Operations
PPTX
IBM QRadar UBA
PDF
Mobile Vision 2020
PDF
Retail Mobility, Productivity and Security
PDF
Close the Loop on Incident Response
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
Automation: Embracing the Future of SecOps
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Integrated Response with v32 of IBM Resilient
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Accelerating SOC Transformation with IBM Resilient and Carbon Black
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Are You Ready to Move Your IAM to the Cloud?
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
WannaCry Ransomware Attack: What to Do Now
How to Improve Threat Detection & Simplify Security Operations
IBM QRadar UBA
Mobile Vision 2020
Retail Mobility, Productivity and Security
Close the Loop on Incident Response
Orchestrate Your Security Defenses; Protect Against Insider Threats

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Cloud computing and distributed systems.
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Electronic commerce courselecture one. Pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation theory and applications.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
sap open course for s4hana steps from ECC to s4
MIND Revenue Release Quarter 2 2025 Press Release
MYSQL Presentation for SQL database connectivity
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Cloud computing and distributed systems.
A comparative analysis of optical character recognition models for extracting...
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Programs and apps: productivity, graphics, security and other tools
Encapsulation theory and applications.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
sap open course for s4hana steps from ECC to s4

State of Application Security: State of Piracy

  • 1. STATE OF APPLICATION SECURITY VOL. 4, 2015 STATE OF PIRACY 1.6M 1.96M ASSETS IS EXPECTED NUMBER OF PIRATED Pirated software found between Jan. 2012 and Mar. 2015 BREAKDOWN OF SOFTWARE PIRACY Between 2012 and 2014 the average Android Apps Key Generators Apple Software Windows Desktop Software Apple Apps number of pirated assets found per year 2012-2014 AVG./YR 2015* was 1.6M. In 2015, the total number of 41% 17% 13% 9% 5% KEY9,000 GENERATORS FOUND Software that generates product licensing keys to enable unauthorized access to software or digital media releases. What are they? APPLICATION RISKS ENABLING PIRACY DISTRIBUTION MODEL FOR REVERSE-ENGINEERING APPLICATION TAMPERING With readily available tools, hackers can quickly convert unprotected binary code back to source-code, repackage and distribute. VOLUME OF PIRATED RELEASES SPEED OF ILLEGAL DISTRIBUTION 100’s 100,000’s 0 sec 33 mins Scene FTP Top Sites Private Torrent Sites Public Sites Cyber- lockers Applications can be modified or injected with malware at run-time to steal keys, and alter execution in line with hacker objectives. 23.76% OF GLOBAL INTERNET BANDWIDTH IS CONSUMED BY TRAFFIC INFRINGING UPON COPYRIGHT. ECONOMIC IMPLICATIONS OF PIRACY 2 pirated assets is expected to hit 1.96M. (Source: iThreat Cyber Group & Arxan Technologies) TO INCREASE 22% PIRATED SOFTWARE IN 2014, THE UNMONETIZED VALUE OF PIRATED ASSETS REACHED $836,840,300,000$652 B $74 B $73 B $18 B $12 B $6 B Software Games Movies TV Music Adult Content UNADDRESSED APPLICATION VULNERABILITIES M1 Weak Server Side Controls M2 Insecure Data Storage M3 Insufficient Transport Layer M4 Unintended Data Leakage M5 Poor Authorization M7 Client Side Injection M9 Improper Session Handling M10 Lack of Binary Protections 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Jan-2015 June-2015 OWASP MOBILE TOP 10 97% OF MOBILE APPS LACK THE PROPER BINARY PROTECTIONS, LEAVING THEM VULNERABLE TO PIRACY. 50% OF ORGANIZATIONS HAVE ZERO BUDGET ALLOCATED TO PROTECTING MOBILE APPS. (M6 and M8 not included in analysis) A recent study analyzed over 96,000 Android apps to measure how well they addressed the OWASP Mobile Top 10 vulnerabilities. The graph below shows the percentage of apps that failed to address these vulnerabilities over time. RECOMMENDATIONS TO MITIGATE SOFTWARE PIRACY 35% 30% 25% 20% 15% 10% 5% Application Layer Data Layer Network Layer RETHINK YOUR SECURITY INVESTMENT APPROACH Consider how much money is spent on application security versus other areas. BUILD RUN-TIME PROTECTIONS INTO YOUR APPLICATIONS Implementing run-time protection will enable self-defense against tampering and malware attacks. Security Risk Spending A 2015 study from Ponemon Institute, sponsored by IBM Security, found that application security spending was not PROTECT YOUR CRYPTOGRAPHIC KEYS White box cryptography solutions can mask both static and dynamic keys. SECURITY RISKS VS. SPEND (Source: MetaIntelli, 2015 Research) Sources: 1. iThreat Cyber Group & Arxan Technologies 2. Study by NetNames/Envisional, sponsored by NBC Universal 3. Tru Optik, 2014 Research 4. MetaIntelli, 2015 Research 5. Ponemon Institute study, sponsored by IBM Security, Mar 2015 3 4 5 SECURITY INVESTMENTS NOT IN LINE WITH LEVEL OF RISK in line with the level of application risk. For additional details & full report, visit Arxan.com