SlideShare a Scribd company logo
Mobile App Security Trends and Topics:
An Examination of Questions From
Stack Overflow
Timothy Huo, Ana Catarina Araújo, Jake Imanaka,
Anthony Peruma, Rick Kazman
H a w a i i I n t e r n a t i o n a l C o n f e r e n c e o n S y s t e m S c i e n c e s
J a n u a r y 2 0 2 5 | W a i k o l o a , H a w a i i
Apps for
everything
4+ million apps on major
app stores & $400+
billion in app revenue
Ease of App
Development
Tech advancements: almost
anyone can create an
app!
Why Study Mobile App Security?
Sensitive Data
Handling
Apps handle sensitive
personal, financial,
and health data
Unique
Characteristics
Mobile apps differ from non-
mobile systems: energy,
permissions, etc.
Why Study Mobile App Security on
Stack Overflow?
Developer
Community
20M+ questions,
answers, and user --
Stack Overflow
represents actual
developer needs
Research
Gap
Limited
understanding of
real-world security
challenges
developers face
Research Goals
Understand key trends, topics, and
challenges around developer
discussions on securing mobile apps
RQ1: Discussion Growth
How have mobile security discussions evolved on Stack Overflow?
RQ2: Security Challenges
What specific security challenges do mobile developers face?
Study Design
Tag Query Title Query
Source
Dataset
Data
Extraction
Data
Analysis
Statistical
Analysis
Topic
Modeling
Manual
Review
Search keywords: “android”, “ios”, “security”
Results
RQ1: Growth of Mobile Security Discussions
Questions
Answered
80%
Total
Questions
5,759
Median
Response Time
87.1m
RQ1: Yearly Growth
RQ1: Tag Categories
Security
Concepts/Features
e.g., “oauth”, “android-
securityexception”
Framework/
Library/API
e.g., “cordova”,
“angularjs”
Programming/Software
Engineering Concepts
e.g., “debugging”, “web-services”
154 101 42
Tools
e.g., “xcode”, “eclipse”
Operating System
e.g., “android”,
“macos”
29 25
RQ2: Security Challenges
What security challenges do mobile developers face?
Topic Analysis
7 security categories identified
through LDA topic modeling
Sample Size
1,499 questions manually
reviewed for categorization
RQ2: Security Challenges
Security Topic Distribution
• Authentication & access control
• OAuth integration
• Source code protection
• User input validation
General Security
• SSL/TLS implementation
• Certificate handling
• HTTPS configuration
• App Transport Security
Secured Communications
• Firebase security rules
• Access control
• Data encryption
• Authentication setup
Database
• Key generation
• Data encryption/decryption
• KeyStore management
• Encryption algorithm selection
Encryption
• Store security policies
• App signing issues
• Vulnerability warnings
• Policy compliance
App Distribution Service
• Zip path traversal vulnerabilities
• Security/permission exceptions when
downloading files
• Security policy configurations
File-Specific
• SecurityException handling
• Permission request implementations
• AndroidManifest configuration
• Runtime permission handling
Permissions
Conclusion
Developers
Better anticipate and
address potential
vulnerabilities in
mobile apps by
planning for security
issues that commonly
arise in practice
Educators
Improve security
training materials and
tools tailored to app
developers
Researchers
Investigate on high-
impact area and
develop better security
tools
Practical Implications
Threats To Validity
Data Source Limitation
Limited to Stack Overflow, may
not fully represent broader
mobile app development
landscape
Query Constraints
Limited to Android and iOS
questions with 'security' in
title/tag, may miss other
relevant posts
Version Analysis
Only most recent versions of
questions analyzed, missing
historical context
Sample Review
Manual review used statistically
significant sample, but may
miss important data points
Conclusion
• Developers seek help in seven specific
security areas:
• Secured Communications
• Database
• App Distribution Service
• Encryption
• Permissions
• File-Specific
• General Security Concerns
RQ 2
• Stack Overflow is a major platform for
mobile security help
• Android security questions dominate
• Platform changes trigger question
surges
RQ 1
Thank
You!
Ad

More Related Content

Similar to Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow (20)

Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
Subho Halder
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Denim Group
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
Subho Halder
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
bugcrowd
 
Mobile App Security - Best Practices
Mobile App Security - Best PracticesMobile App Security - Best Practices
Mobile App Security - Best Practices
RedBlackTree
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
Bitbar
 
A Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration TestingA Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration Testing
Mobile Security
 
Best Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdfBest Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdf
siteseo
 
Data Security in Mobile App Development_ Importance and Strategies (1).pdf
Data Security in Mobile App Development_ Importance and Strategies (1).pdfData Security in Mobile App Development_ Importance and Strategies (1).pdf
Data Security in Mobile App Development_ Importance and Strategies (1).pdf
RahimMakhani2
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Felipe Prado
 
Top 8 Best Practices to Develop Secure Mobile Apps
Top 8 Best Practices to Develop Secure Mobile AppsTop 8 Best Practices to Develop Secure Mobile Apps
Top 8 Best Practices to Develop Secure Mobile Apps
Clarion Technologies
 
Standards and methodology for application security assessment
Standards and methodology for application security assessment Standards and methodology for application security assessment
Standards and methodology for application security assessment
Mykhailo Antonishyn
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
Skycure
 
Best Practices for Embedding Security in the Development Stage
Best Practices for Embedding Security in the Development StageBest Practices for Embedding Security in the Development Stage
Best Practices for Embedding Security in the Development Stage
Covrize IT Solutions Private Limited
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
Krisshhna Daasaarii
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
Securing Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest VersionSecuring Mobile Apps - Appfest Version
Securing Mobile Apps - Appfest Version
Subho Halder
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Denim Group
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
Subho Halder
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
bugcrowd
 
Mobile App Security - Best Practices
Mobile App Security - Best PracticesMobile App Security - Best Practices
Mobile App Security - Best Practices
RedBlackTree
 
How to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS AppsHow to Test Security and Vulnerability of Your Android and iOS Apps
How to Test Security and Vulnerability of Your Android and iOS Apps
Bitbar
 
A Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration TestingA Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration Testing
Mobile Security
 
Best Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdfBest Practices for Secure Web Application Development by Site Invention.pdf
Best Practices for Secure Web Application Development by Site Invention.pdf
siteseo
 
Data Security in Mobile App Development_ Importance and Strategies (1).pdf
Data Security in Mobile App Development_ Importance and Strategies (1).pdfData Security in Mobile App Development_ Importance and Strategies (1).pdf
Data Security in Mobile App Development_ Importance and Strategies (1).pdf
RahimMakhani2
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
Felipe Prado
 
Top 8 Best Practices to Develop Secure Mobile Apps
Top 8 Best Practices to Develop Secure Mobile AppsTop 8 Best Practices to Develop Secure Mobile Apps
Top 8 Best Practices to Develop Secure Mobile Apps
Clarion Technologies
 
Standards and methodology for application security assessment
Standards and methodology for application security assessment Standards and methodology for application security assessment
Standards and methodology for application security assessment
Mykhailo Antonishyn
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
Skycure
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 

More from University of Hawai‘i at Mānoa (20)

Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
University of Hawai‘i at Mānoa
 
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
University of Hawai‘i at Mānoa
 
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
University of Hawai‘i at Mānoa
 
A Developer-Centric Study Exploring Mobile Application Security Practices and...
A Developer-Centric Study Exploring Mobile Application Security Practices and...A Developer-Centric Study Exploring Mobile Application Security Practices and...
A Developer-Centric Study Exploring Mobile Application Security Practices and...
University of Hawai‘i at Mānoa
 
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS CollaborationBuilding Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
University of Hawai‘i at Mānoa
 
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
University of Hawai‘i at Mānoa
 
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
University of Hawai‘i at Mānoa
 
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
University of Hawai‘i at Mānoa
 
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
University of Hawai‘i at Mānoa
 
A Primer on High-Quality Identifier Naming [ASE 2022]
A Primer on High-Quality Identifier Naming [ASE 2022]A Primer on High-Quality Identifier Naming [ASE 2022]
A Primer on High-Quality Identifier Naming [ASE 2022]
University of Hawai‘i at Mānoa
 
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
University of Hawai‘i at Mānoa
 
Preparing for the Academic Job Market: Experience and Tips from a Recent F...
Preparing for the  Academic Job Market:  Experience and Tips from  a Recent F...Preparing for the  Academic Job Market:  Experience and Tips from  a Recent F...
Preparing for the Academic Job Market: Experience and Tips from a Recent F...
University of Hawai‘i at Mānoa
 
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
University of Hawai‘i at Mānoa
 
A Primer on High-Quality Identifier Naming
A Primer on High-Quality Identifier NamingA Primer on High-Quality Identifier Naming
A Primer on High-Quality Identifier Naming
University of Hawai‘i at Mānoa
 
Test Anti-Patterns: From Definition to Detection
Test Anti-Patterns: From Definition to DetectionTest Anti-Patterns: From Definition to Detection
Test Anti-Patterns: From Definition to Detection
University of Hawai‘i at Mānoa
 
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
University of Hawai‘i at Mānoa
 
Understanding Digits in Identifier Names: An Exploratory Study
Understanding Digits in Identifier Names: An Exploratory StudyUnderstanding Digits in Identifier Names: An Exploratory Study
Understanding Digits in Identifier Names: An Exploratory Study
University of Hawai‘i at Mānoa
 
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
University of Hawai‘i at Mānoa
 
IDEAL: An Open-Source Identifier Name Appraisal Tool
IDEAL: An Open-Source Identifier Name Appraisal ToolIDEAL: An Open-Source Identifier Name Appraisal Tool
IDEAL: An Open-Source Identifier Name Appraisal Tool
University of Hawai‘i at Mānoa
 
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...Exploring Code Comprehension  in Scientific Programming:  Preliminary Insight...
Exploring Code Comprehension in Scientific Programming: Preliminary Insight...
University of Hawai‘i at Mānoa
 
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
Exploring Accessibility Trends and Challenges in Mobile App Development: A St...
University of Hawai‘i at Mānoa
 
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
The Impact of Generative AI-Powered Code Generation Tools on Software Enginee...
University of Hawai‘i at Mānoa
 
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
On the Rationale and Use of Assertion Messages in Test Code: Insights from So...
University of Hawai‘i at Mānoa
 
A Developer-Centric Study Exploring Mobile Application Security Practices and...
A Developer-Centric Study Exploring Mobile Application Security Practices and...A Developer-Centric Study Exploring Mobile Application Security Practices and...
A Developer-Centric Study Exploring Mobile Application Security Practices and...
University of Hawai‘i at Mānoa
 
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS CollaborationBuilding Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
Building Hawaii’s IT Future Together CIO Council & UH Manoa ICS Collaboration
University of Hawai‘i at Mānoa
 
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
Impostor Syndrome in Final Year Computer Science Students: An Eye Tracking an...
University of Hawai‘i at Mānoa
 
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
An Exploratory Study on the Occurrence of Self-Admitted Technical Debt in And...
University of Hawai‘i at Mānoa
 
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
Performance Comparison of Binary Machine Learning Classifiers in Identifying ...
University of Hawai‘i at Mānoa
 
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of ...
University of Hawai‘i at Mānoa
 
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
Supporting the Maintenance of Identifier Names: A Holistic Approach to High-Q...
University of Hawai‘i at Mānoa
 
Preparing for the Academic Job Market: Experience and Tips from a Recent F...
Preparing for the  Academic Job Market:  Experience and Tips from  a Recent F...Preparing for the  Academic Job Market:  Experience and Tips from  a Recent F...
Preparing for the Academic Job Market: Experience and Tips from a Recent F...
University of Hawai‘i at Mānoa
 
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
University of Hawai‘i at Mānoa
 
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
Refactoring Debt: Myth or Reality? An Exploratory Study on the Relationship B...
University of Hawai‘i at Mānoa
 
Understanding Digits in Identifier Names: An Exploratory Study
Understanding Digits in Identifier Names: An Exploratory StudyUnderstanding Digits in Identifier Names: An Exploratory Study
Understanding Digits in Identifier Names: An Exploratory Study
University of Hawai‘i at Mānoa
 
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
How Do I Refactor This? An Empirical Study on Refactoring Trends and Topics i...
University of Hawai‘i at Mānoa
 
Ad

Recently uploaded (20)

Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
Xforce Keygen 64-bit AutoCAD 2025 Crack
Xforce Keygen 64-bit AutoCAD 2025  CrackXforce Keygen 64-bit AutoCAD 2025  Crack
Xforce Keygen 64-bit AutoCAD 2025 Crack
usmanhidray
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Agentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM modelsAgentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM models
Manish Chopra
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Landscape of Requirements Engineering for/by AI through Literature Review
Landscape of Requirements Engineering for/by AI through Literature ReviewLandscape of Requirements Engineering for/by AI through Literature Review
Landscape of Requirements Engineering for/by AI through Literature Review
Hironori Washizaki
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest VersionAdobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
usmanhidray
 
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key  With LatestAdobe Photoshop CC 2025 Crack Full Serial Key  With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
usmanhidray
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Adobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest VersionAdobe Illustrator Crack FREE Download 2025 Latest Version
Adobe Illustrator Crack FREE Download 2025 Latest Version
kashifyounis067
 
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMeet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Meet the Agents: How AI Is Learning to Think, Plan, and Collaborate
Maxim Salnikov
 
Xforce Keygen 64-bit AutoCAD 2025 Crack
Xforce Keygen 64-bit AutoCAD 2025  CrackXforce Keygen 64-bit AutoCAD 2025  Crack
Xforce Keygen 64-bit AutoCAD 2025 Crack
usmanhidray
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
FL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full VersionFL Studio Producer Edition Crack 2025 Full Version
FL Studio Producer Edition Crack 2025 Full Version
tahirabibi60507
 
Agentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM modelsAgentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM models
Manish Chopra
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Landscape of Requirements Engineering for/by AI through Literature Review
Landscape of Requirements Engineering for/by AI through Literature ReviewLandscape of Requirements Engineering for/by AI through Literature Review
Landscape of Requirements Engineering for/by AI through Literature Review
Hironori Washizaki
 
Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025Avast Premium Security Crack FREE Latest Version 2025
Avast Premium Security Crack FREE Latest Version 2025
mu394968
 
Kubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptxKubernetes_101_Zero_to_Platform_Engineer.pptx
Kubernetes_101_Zero_to_Platform_Engineer.pptx
CloudScouts
 
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest VersionAdobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
usmanhidray
 
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key  With LatestAdobe Photoshop CC 2025 Crack Full Serial Key  With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
usmanhidray
 
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)
Andre Hora
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfMicrosoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdf
TechSoup
 
EASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License CodeEASEUS Partition Master Crack + License Code
EASEUS Partition Master Crack + License Code
aneelaramzan63
 
Exploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the FutureExploring Wayland: A Modern Display Server for the Future
Exploring Wayland: A Modern Display Server for the Future
ICS
 
Ad

Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow

  • 1. Mobile App Security Trends and Topics: An Examination of Questions From Stack Overflow Timothy Huo, Ana Catarina Araújo, Jake Imanaka, Anthony Peruma, Rick Kazman H a w a i i I n t e r n a t i o n a l C o n f e r e n c e o n S y s t e m S c i e n c e s J a n u a r y 2 0 2 5 | W a i k o l o a , H a w a i i
  • 2. Apps for everything 4+ million apps on major app stores & $400+ billion in app revenue Ease of App Development Tech advancements: almost anyone can create an app! Why Study Mobile App Security? Sensitive Data Handling Apps handle sensitive personal, financial, and health data Unique Characteristics Mobile apps differ from non- mobile systems: energy, permissions, etc.
  • 3. Why Study Mobile App Security on Stack Overflow? Developer Community 20M+ questions, answers, and user -- Stack Overflow represents actual developer needs Research Gap Limited understanding of real-world security challenges developers face
  • 4. Research Goals Understand key trends, topics, and challenges around developer discussions on securing mobile apps RQ1: Discussion Growth How have mobile security discussions evolved on Stack Overflow? RQ2: Security Challenges What specific security challenges do mobile developers face?
  • 6. Tag Query Title Query Source Dataset Data Extraction Data Analysis Statistical Analysis Topic Modeling Manual Review Search keywords: “android”, “ios”, “security”
  • 8. RQ1: Growth of Mobile Security Discussions Questions Answered 80% Total Questions 5,759 Median Response Time 87.1m
  • 10. RQ1: Tag Categories Security Concepts/Features e.g., “oauth”, “android- securityexception” Framework/ Library/API e.g., “cordova”, “angularjs” Programming/Software Engineering Concepts e.g., “debugging”, “web-services” 154 101 42 Tools e.g., “xcode”, “eclipse” Operating System e.g., “android”, “macos” 29 25
  • 11. RQ2: Security Challenges What security challenges do mobile developers face? Topic Analysis 7 security categories identified through LDA topic modeling Sample Size 1,499 questions manually reviewed for categorization
  • 12. RQ2: Security Challenges Security Topic Distribution • Authentication & access control • OAuth integration • Source code protection • User input validation General Security • SSL/TLS implementation • Certificate handling • HTTPS configuration • App Transport Security Secured Communications • Firebase security rules • Access control • Data encryption • Authentication setup Database • Key generation • Data encryption/decryption • KeyStore management • Encryption algorithm selection Encryption • Store security policies • App signing issues • Vulnerability warnings • Policy compliance App Distribution Service • Zip path traversal vulnerabilities • Security/permission exceptions when downloading files • Security policy configurations File-Specific • SecurityException handling • Permission request implementations • AndroidManifest configuration • Runtime permission handling Permissions
  • 14. Developers Better anticipate and address potential vulnerabilities in mobile apps by planning for security issues that commonly arise in practice Educators Improve security training materials and tools tailored to app developers Researchers Investigate on high- impact area and develop better security tools Practical Implications
  • 15. Threats To Validity Data Source Limitation Limited to Stack Overflow, may not fully represent broader mobile app development landscape Query Constraints Limited to Android and iOS questions with 'security' in title/tag, may miss other relevant posts Version Analysis Only most recent versions of questions analyzed, missing historical context Sample Review Manual review used statistically significant sample, but may miss important data points
  • 16. Conclusion • Developers seek help in seven specific security areas: • Secured Communications • Database • App Distribution Service • Encryption • Permissions • File-Specific • General Security Concerns RQ 2 • Stack Overflow is a major platform for mobile security help • Android security questions dominate • Platform changes trigger question surges RQ 1