Threats and Vulnerabilities of Mobile Applications

Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.

Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
Thaísa C. Lacerda ◽  
Juliane V. Nunes ◽  
Christiane Gresse von Wangenheim

In this chapter, we discuss the importance of evaluating the usability of mobile applications using tools and technics that consider their specific characteristics. One common way to evaluate usability is using heuristics. However, since many assumptions regarding usability of computer applications are not true for mobile applications, a question arises: does there exist usability heuristics specific for this type of device? To answer this question, we conducted a systematic literature review. We mapped the encountered sets of heuristics to Nielsen's ten heuristics and identified additional ones specifically proposed for this kind of device. Our review indicates that research with respect to usability heuristics for mobile phones are still sparse. Nevertheless, this chapter provides an overview on the state of the art that can guide the design and evaluation of interfaces for mobile applications as well as provide a starting point for the evolution of such customized heuristics.


Author(s):  
River Yan

The research literature on awareness, knowledge, and ability of mobile security of young mobile phone users was reviewed in this article. The existing literature suggests that young mobile phone users are usually not aware of potential mobile security issues when using a mobile phone. Young mobile phone users are often found to lack the knowledge to detect mobile security problems and to defend themselves in the mobile world. Empirical evidence also exists in which some users do not have the mobile security ability to safely use their mobile phones. Overall, it is vital that young users improve their awareness, knowledge, and ability of mobile security so that they can effectively and enjoyably use their mobile phones.


Author(s):  
George M. Giaglis

The term “mobile era” as a characterization of the 21st century can hardly be considered an exaggeration (Kalakota & Robinson, 2001). Mobile phones are the fastest penetrating technology in the history of mankind, and global mobile phone ownership has surpassed even the ownership of fixed phones. Mobile applications, despite potentially being very different in nature from each other, all share a common characteristic that distinguishes them from their wire-line counterparts: they allow their users to move around while remaining capable of accessing the network and its services. In the mobility era, location identification has naturally become a critical attribute, as it opens the door to a world of applications and services that were unthinkable only a few years ago (May, 2001).


Author(s):  
Ramandeep Singh Sethi ◽  
Aniket Thumar ◽  
Vaibhav Jain ◽  
Sachin Chavan

The usage of mobile phones in today's world is more than ever. Mobile phones are everywhere and the mobile technology is growing at an exponential rate. The capabilities of a mobile phone have made it provide us services that make human life better. One such service that mobile phones can offer us is digital healthcare. Also, it is recognized that mobile phone applications that provide healthcare solutions are trending. Such applications provide a convenient and portable healthcare solutions to all the individuals. Such applications provide a rich experience to a user and in this way, the users will come to know more about their health and body. Digital healthcare mobile applications are capable of diagnosing a disease that a patient is suffering from using his/her symptoms. This information can be used further by a medical practitioner for later on consultation.


10.28945/3301 ◽  
2009 ◽  
Author(s):  
Emmanuel Adagunodo ◽  
Oludele Awodele ◽  
Sunday Idowu

In this paper, we present a way to bring information to students by leveraging the availability of phones (with SMS capability), especially cell phones. We review the use of mobile phones for delivering examination results via Short Messaging Service (SMS) in a university, where student who have written examinations and anxious to see their results need to get their grades in a convenient and accessible way, whether in the comfort of their homes, on the road or while at work. Mobile phone seems to be an asset most individuals’ posses, and take almost everywhere with them, it is therefore a highly effective means of bringing information to them faster, easily and on the move. An SMS result checking system not only enables students to request for their grades, the system can also deliver the grades to their phones as soon as the grades become available. This means that they can access their grades even in the remotest locations where internet facility might be unavailable, preventing them from accessing the school’s website. This study shows the implementation of such system and considers the security issues associated. The system enforces security with the use of secret information (password), and also provides access to new and old grades.


2016 ◽  
Vol 8 (4) ◽  
pp. 33-40
Author(s):  
Vaishnavi Venugopalan ◽  
Chaitanya Vyas

To find the best train ticket booking mobile application on the bases of application features. Four widely used mobile phone applications (Ixigo, MakeMyTrip, ClearTrip, and IRCTC) for railway ticket booking are selected and application features related to ease of download and use, rating, number of installs, etc. are compared. A practical attempt is made to book a train ticket using all these applications one by one and comparing features such as coach locator, platform locator, route map, fare break-up, showing seat availability, save and pre-fill passenger details, sort search list by train name/number, sort search list by journey duration, sort search list by class, train running status, etc. 1 point is allotted to the applications if a particular feature is available in the applications and 0 is allotted if the feature is not available. Sum of all the points is calculated separately for each application and then ranks are given from 1 to 4 considering the final score. Ixigo mobile application scores the highest among other three train ticketing mobile applications – MakeMyTrip, ClearTrip, and IRCTC. Features such as downloading applications via a miss call or SMS; downloading application from websites of Ixigo, MakeMyTrip, ClearTrip, and IRCTC; and sorting train search list by class on applications are not found in any of these four applications. Furthermore, features are grouped into groups such as – the features only available in top ranking Ixigo and the features not available in top ranking Ixigo but available in any or all other three applications. This research will be of a good value for mobile railway ticket booking application providers as competition is becoming acute and the booking pattern is shifting from using desktop or laptop to mobile phones and tablets.


Author(s):  
Filian Enggar Krisnada ◽  
Radius Tanone

Abstract — Pincher is an online platform that is useful for assisting in finding and registering for training classes aimed at facilitating users who want to find their identity and channel their talents and inspirations creatively. This pincher application provides information and distributes training classes by selling class tickets. In its development as an online platform, Pincher still uses the website as a means of distributing training classes owned by Pincher, so this tool is less effective and efficient for users because the Pincher website is too complicated to access using a mobile phone or smartphone. Therefore, to help users access the Pincher application using their mobile phones, Pincher applications are made in a simple form that is applied to mobile applications. In addition, Pincher also does not have a feature that can make it easier for customers to determine the class to be chosen. Therefore this mobile application will be equipped with a system that can make it easier for users to choose attractive classes for customers, namely with a recommendation system.   Keywords— Ticket Selling Application, Flutter, Mobile Application, Recommendation System.


2018 ◽  
Author(s):  
Yong-Yan Fan ◽  
Yan-Guang Li ◽  
Jian Li ◽  
Wen-Kun Cheng ◽  
Zhao-Liang Shan ◽  
...  

BACKGROUND Atrial fibrillation (AF) is the most common sustained cardiac arrhythmia. The asymptomatic nature and paroxysmal frequency of AF lead to suboptimal early detection. A novel technology, photoplethysmography (PPG), has been developed for AF screening. However, there has been limited validation of mobile phone and smart band apps with PPG compared to 12-lead electrocardiograms (ECG). OBJECTIVE We investigated the feasibility and accuracy of a mobile phone and smart band for AF detection using pulse data measured by PPG. METHODS A total of 112 consecutive inpatients were recruited from the Chinese PLA General Hospital from March 15 to April 1, 2018. Participants were simultaneously tested with mobile phones (HUAWEI Mate 9, HUAWEI Honor 7X), smart bands (HUAWEI Band 2), and 12-lead ECG for 3 minutes. RESULTS In all, 108 patients (56 with normal sinus rhythm, 52 with persistent AF) were enrolled in the final analysis after excluding four patients with unclear cardiac rhythms. The corresponding sensitivity and specificity of the smart band PPG were 95.36% (95% CI 92.00%-97.40%) and 99.70% (95% CI 98.08%-99.98%), respectively. The positive predictive value of the smart band PPG was 99.63% (95% CI 97.61%-99.98%), the negative predictive value was 96.24% (95% CI 93.50%-97.90%), and the accuracy was 97.72% (95% CI 96.11%-98.70%). Moreover, the diagnostic sensitivity, specificity, positive predictive value, negative predictive value, and accuracy of mobile phones with PPG for AF detection were over 94%. There was no significant difference after further statistical analysis of the results from the different smart devices compared with the gold-standard ECG (P>.99). CONCLUSIONS The algorithm based on mobile phones and smart bands with PPG demonstrated good performance in detecting AF and may represent a convenient tool for AF detection in at-risk individuals, allowing widespread screening of AF in the population. CLINICALTRIAL Chinese Clinical Trial Registry ChiCTR-OOC-17014138; http://www.chictr.org.cn/showproj.aspx?proj=24191 (Archived by WebCite at http://www.webcitation/76WXknvE6)


Author(s):  
Lili Nemec Zlatolas ◽  
Tatjana Welzer-Druzovec ◽  
Marjan Heričko ◽  
Marko Hölbl

The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.


Sign in / Sign up

Export Citation Format

Share Document