skip to main content
10.1145/3321408.3321418acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

Management system for secure mobile application development

Published:17 May 2019Publication History

ABSTRACT

Most mobile Internet application security issues are introduced in the development process. How to effectively prevent security problems and solve them as soon as possible in the development process of mobile application development is the key to the security of mobile Internet. This paper introduces the design and implementation of a management and control platform for secure mobile application development. For Android applications and iOS applications, security standards are provided for different application types in the form of security baselines, and the application security baseline standards are managed in the form of security knowledge base. The security baseline points are mapped to specific application security technical specifications and security verification technical points. It provides an effective solution for secure mobile application development.

References

  1. Qing Y, Ge P, Paolo G, et al. MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones{J}. IEEE Transactions on Information Forensics and Security, 2018:1--1.Google ScholarGoogle Scholar
  2. Lin Y D, Huang C Y, Wright M, et al. Mobile Application Security{J}. Computer, 2014, 47(6):21--23.Google ScholarGoogle ScholarCross RefCross Ref
  3. He D, Chan S, Guizani M. Mobile application security: malware threats and defenses{J}. Wireless Communications IEEE, 2015, 22(1):138--144.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sardasht M, Bakhtiar M, Rebwar M. Mobile Application Security Platforms Survey{J}. International Journal of Computer Applications, 2016, 133.Google ScholarGoogle Scholar
  5. Zhou Z, Sun C, Lu J, et al. Research and Implementation of Mobile Application Security Detection Combining Static and Dynamic{C}// 2018 10th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). 2018.Google ScholarGoogle Scholar
  6. Yang X Y, Guo-Ai X U. Construction Method on Mobile Application Security Ecological Chain{J}. Journal of Software, 2017.Google ScholarGoogle Scholar
  7. Xu Y, Wang G, Ren J, et al. An adaptive and configurable protection framework against android privilege escalation threats{J}. Future Generation Computer Systems, 2018.Google ScholarGoogle Scholar
  8. Wu L, Zhang Y, Yong X, et al. An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices{J}. Wireless Personal Communications, 2016:1--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ma Z, Wang X, Ma R. Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept{J}. Sensors, 18(9):2894-.Google ScholarGoogle Scholar
  10. https://echarts.baidu.com/Google ScholarGoogle Scholar

Index Terms

  1. Management system for secure mobile application development

    Recommendations

    Reviews

    Shailesh Rangari

    Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive and provides verifiable security. Application security is usually assessed outside of (or at the end of) the development life cycle and incurs a heavy cost on productivity and security. Traditional security development approaches do not align well with the mobile application development world due to myriad differences between mobile and desktop systems. The author's approach prescribes a security baseline for mobile app development and technical controls that verify the security provided by the baselines. The idea of shifting security left in the development life cycle is not novel, but the presented secure verifiable approach is desirable and moves the needle in the right direction. The overall schema developed by the author is impressive and worth using as a reference to emulate these results in commercial or production development environments to reduce the security exposure of mobile apps.

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - China
      May 2019
      963 pages
      ISBN:9781450371582
      DOI:10.1145/3321408

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 May 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader