1. https://appdevelopermagazine.com/security
  2. https://appdevelopermagazine.com/five-common-mobile-app-security-vulnerabilities--and-how-to-fix-them/
4/30/2016 10:06:57 AM
Five Common Mobile App Security Vulnerabilities And How to Fix Them
Security,Northgate Digital,Server-side
App Developer Magazine
Five Common Mobile App Security Vulnerabilities  And How to Fix Them


Five Common Mobile App Security Vulnerabilities And How to Fix Them

Saturday, April 30, 2016

Seth Jaslow Seth Jaslow

Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. 

As mobile app usage continues its exponential rise, so does attention to security.

Nissan was the latest household brand stung by mobile app insecurity last month when it was forced to shut down an app for its Leaf electric vehicle after security experts showed how to use the app's insecure APIs to remotely control any of the vehicles' functions.

With that and more at stake, here are the five most common security vulnerabilities for mobile apps – and how you can remedy them. 

1) Server-side Components

How the app communicates with server applications for data processing and business logic is a key component of mobile app security. Typically this communication is done via web services or API calls. Failure to properly secure these calls with secure programming practices is the most common vulnerability I see in mobile apps. 

Indeed, The Open Web Application Security Project (OWASP) - an online community of articles, methodologies, documentation, tools, and technologies in web application security - also lists this as the leading mobile app vulnerability. 

Vulnerabilities in this category include Cross-Site Scripting, weak or absent authentication, injection style attacks, and cross-site request forgery (CSRF). 

How to prevent it

Securing APIs and web services requires knowledge of general web application security, and secure web programming practices will reduce or eliminate this risk on the server. Many of the possible vulnerabilities and mitigation strategies can be researched at OWASP (www.owasp.org). Static code analysis tools are available to spot many common security vulnerabilities, and these tools should be incorporated into the development lifecycle.

2) Network Traffic Protection

Even if the server itself is secure, any network traffic sent from mobile apps unencrypted can be intercepted and possibly used for session hijacking, CSRF and “man in the middle” attacks. These types of attacks can take place anywhere a mobile device transmits data, from the carrier network to the free WiFi at the local coffee shop. An attacker needs nothing more than an access point to intercept every packet sent to and from your app.

How to prevent it

While designing and programming your app, assume that all network traffic to and from the app is being intercepted. Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as “SSL,” are cryptographic protocols designed to provide communications security over a computer network. You can use SSL/TLS to secure all information transferred between your app and any server applications. 

Lastly, it’s important to adhere to SSL/TLS best practices. Require SSL chain verification; use strong cipher suites, and either alert users or halt app execution in the event of an invalid certificate to protect your network traffic. 

3) Data Leakage

Because mobile devices are difficult to physically secure, any time data is stored on a mobile device, care must be taken to protect sensitive information. 

Unsecured data may result in vulnerabilities such as invasions of privacy, violations of the Payment Card Industry Data Security Standard (a proprietary information security standard for organizations handling branded credit), identity theft and fraud. Stored data may be accessed remotely by malware, or with readily available forensic tools.

How to prevent it

Each device handles data storage differently. Developers must understand the implications of how data is stored, cached and accessed, not only on each specific device, but also within each development framework. Common data leakage vectors include event and data logging, copy/paste buffers, HTTP caching, HTML5 local and session storage, and cookies.

4) Lack of Binary Protection

Any secure application deployed to a device that is outside of the developer’s control must include measures to prevent attackers from decrypting, reverse engineering, or modifying application code – and mobile apps are no exception. Failing to protect your app against code modification could result in unauthorized access, disclosure of confidential data and even piracy of the app itself. Once the app binary has been compromised, even the most stringent security measures can be bypassed with relative ease. 

How to prevent it

Become intimately familiar with the ways in which your target platforms support binary protection. Jailbreak/debugger detection, code modification detection (checksum controls), certificate pinning, and code obfuscation are just a few of the ways to protect secure applications from unauthorized modification. A more extensive guide can be found at OWASP.

5) Insecure Authentication

Mobile apps often need to function even when offline, and this unique requirement means authentication is often designed to be less secure than traditional server-side or web authentication – using four-digit PINs, for example, or storing password hashes on the device itself. In some cases, such as the recent Nissan Leaf breach, virtually no authentication may exist at all.

How to prevent it

Design your app with the assumption that authentication can be circumvented by an attacker on the client-side and on the server. Make no assumptions about the authentication state of the user, and do not allow the mobile app to perform authorization logic on behalf of the server.

For security-sensitive apps that must authenticate and authorize the user entirely on the client-side (i.e. for offline use), ensure proper binary protection exists.


All of the actions detailed here will help you develop markedly more secure mobile applications.

Read more: http://www.ngdcorp.com/
This content is made possible by a guest author, or sponsor; it is not written by and does not necessarily reflect the views of App Developer Magazine's editorial staff.

Subscribe to App Developer Magazine

Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.


  • - Exclusive content from leaders in the industry
  • - Q&A articles from industry leaders
  • - Tips and tricks from the most successful developers weekly
  • - Monthly issues, including all 90+ back-issues since 2012
  • - Event discounts and early-bird signups
  • - Gain insight from top achievers in the app store
  • - Learn what tools to use, what SDK's to use, and more

    Subscribe here