SlideShare a Scribd company logo
Modified Mobile App-                         Abstract: A pro-active mobile security control
                                             system around the apps submission process that
Store Architecture with                      identifies and prevents publishing malicious
                                             intent apps on the stores is very much required.
Pro-active Security                          This white-paper highlights modification in the
                                             generic architecture of an app-store for pro-
Control                                      actively integrating the apps security control
                                             system and that can fit or plug-in into the existing
Author                                       app-stores easily.
Rajesh Kumar
Mobile Security R&D and Services

7th November 2011




                            © Tech Mahindra Limited 2010              © Tech Mahindra Limited 2011
Table of Contents
Table of Contents ............................................................................ 1
Introduction .................................................................................... 2
Apps Development and Distribution .................................................. 2
The App Store Architecture .............................................................. 3
Modified Architecture with Pro-active Security Control ...................... 4
Apps Security Module ...................................................................... 5
Security Test Scope .......................................................................... 5
About Author .................................................................................. 6
About Tech Mahindra Limited .......................................................... 6




                                                                                                      1
                            © Tech Mahindra Limited 2011
Introduction
    Smartphones are enjoying ever-increasing users, business and popularity today. The
    integration of new high-speed wireless technologies, multimedia capabilities,
    document editors, millions of social-sites users, availability of centralized apps-
    stores, and new generation developers, previously found on Personal Computers, is
    leading the smartphones becoming real powerhouses. This has also brought cyber
    risks, not only the malware infecting the operations of phone, but also phishing of
    applications, targeting users with Trojans and Spywares for stealing personal
    information, high billing by making hidden calls and sms to premium numbers, and
    malvertising.

    As smart-phones have small apps widely downloaded from centralized app-stores
    free or commercially, they are exposed to additional risks: they are also an attractive
    way for hackers for centralized distribution of a malicious app embedded with
    financial fraud and network traffic generator. Currently most of the stores are
    implemented with certificate based trust-chain and abuse reporting by end-users
    which are not sufficient to control security incidents reported in malware apps.

    To avoid such scenarios, app-stores should employ pro-active malware and security
    assessment and control systems for mobile apps in the app-store infrastructure. This
    security system will result in a way where only safe apps are published in the apps-
    store and thus protecting billions of downloading by million of users from thousands
    of malware apps.



    Apps Development and Distribution
    Mobile App-stores are evolving and million of users visit for downloading latest apps
    making it the primary distribution channels for 45% of developers across platforms.
    Three platforms namely Android, iOS and Mobile-web are leading among developers
    as surveyed and published by app-store analysts. Many dedicated app stores for the
    classified customers, enterprise and business applications can be launched in future.




2
                     © Tech Mahindra Limited 2011
The App Store Architecture
Hackers are effectively able to turn mobile malware into biggest consumer problem.
Bank users are relatively increasing who bank from their mobile devices. If we add
application zero-day vulnerabilities into current mobile malware threats, the risk will
be catastrophic.

In the current app-store architecture, security system is not adopted as part in the
apps publishing infrastructure or its life-cycle. In general, an app store includes
following main key components as depicted in the below figure.

    Administrative console,
    Product catalogs,
    A central apps/content repository, and
    Sales promotional channels.




                                                                                          3
                 © Tech Mahindra Limited 2011
Modified Architecture with Pro-active Security Control
    Hackers and fraudsters are two steps ahead in acquiring tools and techniques to
    effectively turn mobile malware and application vulnerabilities into the biggest
    security problem. This brings challenges for security vendors and content providers
    like Google, Android-market and others to take-off 50 or more malicious apps from
    their app-stores after thousand of users have already downloaded and reported.
    This mitigation mechanism cannot effectively stop the malware apps getting
    published in the stores. Publishers can black-list old user-ids and certificates which
    can be overridden or bypassed by creation of new user-ids and certificates.

    Building a power-packed fraudulent application for stealing and abusing identity,
    financial fraud, malware repackaging is almost simple. Distributing these apps on the
    apps-store is even simpler.

    A pro-active mobile security control system around the apps submission process
    that identifies and prevents publishing malicious intent apps on the stores is very
    much required. The current app-store architecture needs to be augmented with in-
    line security module. This modified architecture is integrated with a pro-active
    mobile apps security control system that can fit or plug-in into the existing app-store
    easily as depicted in the below figure. This mitigation mechanism would be effective
    for discarding or denying the malware intent apps and vulnerability exposed apps in
    the apps submission process by the security system scanner pro-actively.




4
                     © Tech Mahindra Limited 2011
Apps Security Module
When the developer decides to self publish the app in the App-store as free or paid
subscription, the in-line comprehensive security test should be activated that
consists of all or some of the below sub-modules for each application.

   1. Malware Intent test

   2. Anti-virus and Anti-malware test

   3. Dynamic behavior security test

   4. Secure code-review test




Security Test Scope
Following security checks are the minimum to be done for any apps in the process of
publishing to the app-store.

       Malware review

       Financial Fraud

       Unsecure Connectivity

       System Control and Resource Exhaustion Test

       Vulnerable Interfaces

       Network Traffic Analysis

       Secure Programming




This would marginally reduce the Rogue applications, malicious websites, malware
in the app-store among top mobile threats.




                                                                                      5
                 © Tech Mahindra Limited 2011
About Author

        Rajesh Kumar leads Mobile Security R&D and Services in Tech Mahindra Limited.
    His 18 years of industry experience begins along with the evolvement of application
    proxy and network firewalling security system. His current assignment includes
    development of mobile security control systems and services around mobile apps,
    mobile networks, and enterprise mobility.

    He developed various enterprise systems, network services and their architectures
    while working with Indian Space Research Organization, ISRO in his earlier
    organization.

    His qualifications include Bachelor of Engg in Computer science & engg subject from
    BIT Sindri, India and Post Graduate Certificate in Business management from XIM
    Bhubaneswar, India.


    About Tech Mahindra Limited
    Tech Mahindra has in-house developed App-store security solution and service
    ‘MobiSecure’ to check malicious apps before them getting published in the app-
    store. The service is capable of testing thousands of mobile apps that are ready in a
    day.

    Tech Mahindra is part of the US $12.5 billion Mahindra Group, in partnership with
    British Telecommunications plc (BT), one of the world’s leading communications
    service providers. Focused primarily on the telecommunications industry, Tech
    Mahindra is a leading global systems integrator and business transformation
    consulting organization. Tech Mahindra has recently expanded its IT portfolio by
    acquiring the leading global business and information technology services company,
    Mahindra Satyam (earlier known as Satyam Computer Services).

    Tech Mahindra’s capabilities spread across a broad spectrum, including Business
    Support Systems (BSS), Operations Support Systems (OSS), Network Design &
    Engineering, Next Generation Networks, Mobility Solutions, Security consulting and
    Testing. The solutions portfolio includes Consulting, Application Development &
    Management, Network Services, Solution Integration, Product Engineering,
    Infrastructure Managed Services, Remote Infrastructure Management and BSG
    (comprises BPO, Services and Consulting). With an array of service offerings for TSPs,
    TEMs and ISVs, Tech Mahindra is a chosen transformation partner for several
    leading wireline, wireless and broadband operators in Europe, Asia-Pacific and North
    America.

    For Security Services, kindly visit our website http://www.techmahindra.com/security/

    For further information or to have a sales representative contact you, mail at
    security.sales@techmahindra.com.


6
                      © Tech Mahindra Limited 2011
Ad

More Related Content

What's hot (20)

Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
Prachi Joshi
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-Administrators
MobileSolutionsDTAG
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Sierraware
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET Journal
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
Symantec
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
IBM Security
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
Symantec
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IJET-V3I1P9
IJET - International Journal of Engineering and Techniques
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
IRJET Journal
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
shriram suryanarayanan
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
MobileIron
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
IRJET Journal
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks
 
Knowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrixKnowledge brief securonix-ueba-market_2018-spark-matrix
Knowledge brief securonix-ueba-market_2018-spark-matrix
Prachi Joshi
 
Mobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-AdministratorsMobile App Management (MAM) for Developers and IT-Administrators
Mobile App Management (MAM) for Developers and IT-Administrators
MobileSolutionsDTAG
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Sierraware
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
Tharaka Mahadewa
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET Journal
 
The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014The Forrester Wave™: Enterprise Mobile Management Q3 2014
The Forrester Wave™: Enterprise Mobile Management Q3 2014
Symantec
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
IBM Security
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
Symantec
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET Journal
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
IRJET Journal
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
IJCSIS Research Publications
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
Jessica Lavery Pozerski
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
Sean Varga
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
MobileIron
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
IRJET Journal
 

Viewers also liked (6)

MAHINDRA &MAHINDARA
MAHINDRA &MAHINDARAMAHINDRA &MAHINDARA
MAHINDRA &MAHINDARA
Vinod Solanki
 
Mahindra xuv 500 pricing strategy
Mahindra xuv 500 pricing strategyMahindra xuv 500 pricing strategy
Mahindra xuv 500 pricing strategy
Nikhil Bhagat
 
Social Networking Project
Social Networking ProjectSocial Networking Project
Social Networking Project
jessduff44
 
A study on customer satisfaction towards honda activa
A study on customer satisfaction towards honda activaA study on customer satisfaction towards honda activa
A study on customer satisfaction towards honda activa
Hardik Ranpariya
 
Mahindra & mahindra project repot by (makshud khan)
Mahindra & mahindra project repot  by (makshud khan)Mahindra & mahindra project repot  by (makshud khan)
Mahindra & mahindra project repot by (makshud khan)
Makshud Khan
 
A project report on customer satisfaction of two wheelers industries with spe...
A project report on customer satisfaction of two wheelers industries with spe...A project report on customer satisfaction of two wheelers industries with spe...
A project report on customer satisfaction of two wheelers industries with spe...
Projects Kart
 
Mahindra xuv 500 pricing strategy
Mahindra xuv 500 pricing strategyMahindra xuv 500 pricing strategy
Mahindra xuv 500 pricing strategy
Nikhil Bhagat
 
Social Networking Project
Social Networking ProjectSocial Networking Project
Social Networking Project
jessduff44
 
A study on customer satisfaction towards honda activa
A study on customer satisfaction towards honda activaA study on customer satisfaction towards honda activa
A study on customer satisfaction towards honda activa
Hardik Ranpariya
 
Mahindra & mahindra project repot by (makshud khan)
Mahindra & mahindra project repot  by (makshud khan)Mahindra & mahindra project repot  by (makshud khan)
Mahindra & mahindra project repot by (makshud khan)
Makshud Khan
 
A project report on customer satisfaction of two wheelers industries with spe...
A project report on customer satisfaction of two wheelers industries with spe...A project report on customer satisfaction of two wheelers industries with spe...
A project report on customer satisfaction of two wheelers industries with spe...
Projects Kart
 
Ad

Similar to Tech mahindra whitepaper modified mobile app store architecture with pro active security control (20)

Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
FuGenx Technologies
 
Mobile App Security: Essential Guide to Protecting Your App and Data
Mobile App Security: Essential Guide to Protecting Your App and DataMobile App Security: Essential Guide to Protecting Your App and Data
Mobile App Security: Essential Guide to Protecting Your App and Data
ScalaCode
 
Mobile App Security: Best Practices for Protecting User Data
Mobile App Security: Best Practices for Protecting User DataMobile App Security: Best Practices for Protecting User Data
Mobile App Security: Best Practices for Protecting User Data
JohnParker598570
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
madhuri871014
 
A Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration TestingA Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration Testing
Mobile Security
 
How to Ensure Security in Software Application Development.pdf
How to Ensure Security in Software Application Development.pdfHow to Ensure Security in Software Application Development.pdf
How to Ensure Security in Software Application Development.pdf
himanshuwowit
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Mobile Application Penetration Testing: Ensuring the Security of Your Apps
Mobile Application Penetration Testing: Ensuring the Security of Your AppsMobile Application Penetration Testing: Ensuring the Security of Your Apps
Mobile Application Penetration Testing: Ensuring the Security of Your Apps
Mobile Security
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Hepto Software Company
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
mightymarketing
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
Cerebrum Infotech
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
Appear
 
Application Security 101_ Protecting Software from Cyber Threats.pdf
Application Security 101_ Protecting Software from Cyber Threats.pdfApplication Security 101_ Protecting Software from Cyber Threats.pdf
Application Security 101_ Protecting Software from Cyber Threats.pdf
aashinn15
 
Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...
madhuri871014
 
The Evolution of Cybersecurity in Software Development for 2025
The Evolution of Cybersecurity in Software Development for 2025The Evolution of Cybersecurity in Software Development for 2025
The Evolution of Cybersecurity in Software Development for 2025
ScalaCode
 
How to Secure Your Mobile App from Cyber Threats.pdf
How to Secure Your Mobile App from Cyber Threats.pdfHow to Secure Your Mobile App from Cyber Threats.pdf
How to Secure Your Mobile App from Cyber Threats.pdf
Rajmith
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
IndusfacePvtLtd
 
Revolutionizing Business with Enterprise Mobile App Development
Revolutionizing Business with Enterprise Mobile App DevelopmentRevolutionizing Business with Enterprise Mobile App Development
Revolutionizing Business with Enterprise Mobile App Development
Supreme_Technologies
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Tips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdfTips To Protect Your Mobile App from Hackers.pdf
Tips To Protect Your Mobile App from Hackers.pdf
FuGenx Technologies
 
Mobile App Security: Essential Guide to Protecting Your App and Data
Mobile App Security: Essential Guide to Protecting Your App and DataMobile App Security: Essential Guide to Protecting Your App and Data
Mobile App Security: Essential Guide to Protecting Your App and Data
ScalaCode
 
Mobile App Security: Best Practices for Protecting User Data
Mobile App Security: Best Practices for Protecting User DataMobile App Security: Best Practices for Protecting User Data
Mobile App Security: Best Practices for Protecting User Data
JohnParker598570
 
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docxMobile App Security Protecting Your App from Cyber Threats.edited.docx
Mobile App Security Protecting Your App from Cyber Threats.edited.docx
madhuri871014
 
A Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration TestingA Comprehensive Guide to Mobile Application Penetration Testing
A Comprehensive Guide to Mobile Application Penetration Testing
Mobile Security
 
How to Ensure Security in Software Application Development.pdf
How to Ensure Security in Software Application Development.pdfHow to Ensure Security in Software Application Development.pdf
How to Ensure Security in Software Application Development.pdf
himanshuwowit
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Mobile Application Penetration Testing: Ensuring the Security of Your Apps
Mobile Application Penetration Testing: Ensuring the Security of Your AppsMobile Application Penetration Testing: Ensuring the Security of Your Apps
Mobile Application Penetration Testing: Ensuring the Security of Your Apps
Mobile Security
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Hepto Software Company
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
Cerebrum Infotech
 
White Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise dataWhite Paper - Securing Mobile Access to enterprise data
White Paper - Securing Mobile Access to enterprise data
Appear
 
Application Security 101_ Protecting Software from Cyber Threats.pdf
Application Security 101_ Protecting Software from Cyber Threats.pdfApplication Security 101_ Protecting Software from Cyber Threats.pdf
Application Security 101_ Protecting Software from Cyber Threats.pdf
aashinn15
 
Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...Security in Mobile App Development Protecting User Data and Preventing Cybera...
Security in Mobile App Development Protecting User Data and Preventing Cybera...
madhuri871014
 
The Evolution of Cybersecurity in Software Development for 2025
The Evolution of Cybersecurity in Software Development for 2025The Evolution of Cybersecurity in Software Development for 2025
The Evolution of Cybersecurity in Software Development for 2025
ScalaCode
 
How to Secure Your Mobile App from Cyber Threats.pdf
How to Secure Your Mobile App from Cyber Threats.pdfHow to Secure Your Mobile App from Cyber Threats.pdf
How to Secure Your Mobile App from Cyber Threats.pdf
Rajmith
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
IndusfacePvtLtd
 
Revolutionizing Business with Enterprise Mobile App Development
Revolutionizing Business with Enterprise Mobile App DevelopmentRevolutionizing Business with Enterprise Mobile App Development
Revolutionizing Business with Enterprise Mobile App Development
Supreme_Technologies
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Ad

Recently uploaded (20)

TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 

Tech mahindra whitepaper modified mobile app store architecture with pro active security control

  • 1. Modified Mobile App- Abstract: A pro-active mobile security control system around the apps submission process that Store Architecture with identifies and prevents publishing malicious intent apps on the stores is very much required. Pro-active Security This white-paper highlights modification in the generic architecture of an app-store for pro- Control actively integrating the apps security control system and that can fit or plug-in into the existing Author app-stores easily. Rajesh Kumar Mobile Security R&D and Services 7th November 2011 © Tech Mahindra Limited 2010 © Tech Mahindra Limited 2011
  • 2. Table of Contents Table of Contents ............................................................................ 1 Introduction .................................................................................... 2 Apps Development and Distribution .................................................. 2 The App Store Architecture .............................................................. 3 Modified Architecture with Pro-active Security Control ...................... 4 Apps Security Module ...................................................................... 5 Security Test Scope .......................................................................... 5 About Author .................................................................................. 6 About Tech Mahindra Limited .......................................................... 6 1 © Tech Mahindra Limited 2011
  • 3. Introduction Smartphones are enjoying ever-increasing users, business and popularity today. The integration of new high-speed wireless technologies, multimedia capabilities, document editors, millions of social-sites users, availability of centralized apps- stores, and new generation developers, previously found on Personal Computers, is leading the smartphones becoming real powerhouses. This has also brought cyber risks, not only the malware infecting the operations of phone, but also phishing of applications, targeting users with Trojans and Spywares for stealing personal information, high billing by making hidden calls and sms to premium numbers, and malvertising. As smart-phones have small apps widely downloaded from centralized app-stores free or commercially, they are exposed to additional risks: they are also an attractive way for hackers for centralized distribution of a malicious app embedded with financial fraud and network traffic generator. Currently most of the stores are implemented with certificate based trust-chain and abuse reporting by end-users which are not sufficient to control security incidents reported in malware apps. To avoid such scenarios, app-stores should employ pro-active malware and security assessment and control systems for mobile apps in the app-store infrastructure. This security system will result in a way where only safe apps are published in the apps- store and thus protecting billions of downloading by million of users from thousands of malware apps. Apps Development and Distribution Mobile App-stores are evolving and million of users visit for downloading latest apps making it the primary distribution channels for 45% of developers across platforms. Three platforms namely Android, iOS and Mobile-web are leading among developers as surveyed and published by app-store analysts. Many dedicated app stores for the classified customers, enterprise and business applications can be launched in future. 2 © Tech Mahindra Limited 2011
  • 4. The App Store Architecture Hackers are effectively able to turn mobile malware into biggest consumer problem. Bank users are relatively increasing who bank from their mobile devices. If we add application zero-day vulnerabilities into current mobile malware threats, the risk will be catastrophic. In the current app-store architecture, security system is not adopted as part in the apps publishing infrastructure or its life-cycle. In general, an app store includes following main key components as depicted in the below figure.  Administrative console,  Product catalogs,  A central apps/content repository, and  Sales promotional channels. 3 © Tech Mahindra Limited 2011
  • 5. Modified Architecture with Pro-active Security Control Hackers and fraudsters are two steps ahead in acquiring tools and techniques to effectively turn mobile malware and application vulnerabilities into the biggest security problem. This brings challenges for security vendors and content providers like Google, Android-market and others to take-off 50 or more malicious apps from their app-stores after thousand of users have already downloaded and reported. This mitigation mechanism cannot effectively stop the malware apps getting published in the stores. Publishers can black-list old user-ids and certificates which can be overridden or bypassed by creation of new user-ids and certificates. Building a power-packed fraudulent application for stealing and abusing identity, financial fraud, malware repackaging is almost simple. Distributing these apps on the apps-store is even simpler. A pro-active mobile security control system around the apps submission process that identifies and prevents publishing malicious intent apps on the stores is very much required. The current app-store architecture needs to be augmented with in- line security module. This modified architecture is integrated with a pro-active mobile apps security control system that can fit or plug-in into the existing app-store easily as depicted in the below figure. This mitigation mechanism would be effective for discarding or denying the malware intent apps and vulnerability exposed apps in the apps submission process by the security system scanner pro-actively. 4 © Tech Mahindra Limited 2011
  • 6. Apps Security Module When the developer decides to self publish the app in the App-store as free or paid subscription, the in-line comprehensive security test should be activated that consists of all or some of the below sub-modules for each application. 1. Malware Intent test 2. Anti-virus and Anti-malware test 3. Dynamic behavior security test 4. Secure code-review test Security Test Scope Following security checks are the minimum to be done for any apps in the process of publishing to the app-store. Malware review Financial Fraud Unsecure Connectivity System Control and Resource Exhaustion Test Vulnerable Interfaces Network Traffic Analysis Secure Programming This would marginally reduce the Rogue applications, malicious websites, malware in the app-store among top mobile threats. 5 © Tech Mahindra Limited 2011
  • 7. About Author Rajesh Kumar leads Mobile Security R&D and Services in Tech Mahindra Limited. His 18 years of industry experience begins along with the evolvement of application proxy and network firewalling security system. His current assignment includes development of mobile security control systems and services around mobile apps, mobile networks, and enterprise mobility. He developed various enterprise systems, network services and their architectures while working with Indian Space Research Organization, ISRO in his earlier organization. His qualifications include Bachelor of Engg in Computer science & engg subject from BIT Sindri, India and Post Graduate Certificate in Business management from XIM Bhubaneswar, India. About Tech Mahindra Limited Tech Mahindra has in-house developed App-store security solution and service ‘MobiSecure’ to check malicious apps before them getting published in the app- store. The service is capable of testing thousands of mobile apps that are ready in a day. Tech Mahindra is part of the US $12.5 billion Mahindra Group, in partnership with British Telecommunications plc (BT), one of the world’s leading communications service providers. Focused primarily on the telecommunications industry, Tech Mahindra is a leading global systems integrator and business transformation consulting organization. Tech Mahindra has recently expanded its IT portfolio by acquiring the leading global business and information technology services company, Mahindra Satyam (earlier known as Satyam Computer Services). Tech Mahindra’s capabilities spread across a broad spectrum, including Business Support Systems (BSS), Operations Support Systems (OSS), Network Design & Engineering, Next Generation Networks, Mobility Solutions, Security consulting and Testing. The solutions portfolio includes Consulting, Application Development & Management, Network Services, Solution Integration, Product Engineering, Infrastructure Managed Services, Remote Infrastructure Management and BSG (comprises BPO, Services and Consulting). With an array of service offerings for TSPs, TEMs and ISVs, Tech Mahindra is a chosen transformation partner for several leading wireline, wireless and broadband operators in Europe, Asia-Pacific and North America. For Security Services, kindly visit our website http://www.techmahindra.com/security/ For further information or to have a sales representative contact you, mail at [email protected]. 6 © Tech Mahindra Limited 2011