Mapping Risk Assessment Strategy for COVID-19 Mobile Apps’ Vulnerabilities
نویسندگان
چکیده
Recent innovations in mobile technologies are playing an important and vital role combating the COVID-19 pandemic. While apps’ functionality plays a crucial tackling spread, it is also raising concerns about associated privacy risks that users may face. research studies have showed various technological measures on applications lack consideration of their data practices. For example, security vulnerabilities apps can be exploited therefore pose violations. In this paper, we focus recent newly developed consider threat landscape. Our objective was to identify lead user-level risks. We formalize our approach by measuring level risk with assets services attackers targeting capture during exploitation. utilized baseline assessment criteria within scope three specific often exists namely credential leaks, insecure communication, HTTP request libraries. present proof concept implementation for evaluate impact likelihood.
منابع مشابه
Analyzing Android Browser Apps for file: // Vulnerabilities
Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtai...
متن کاملDeveloping a Method for Assessing and Managing the Risk of Covid-19; Rapid Covid-19 Hazard analysis
Background and aims: Work environments are constantly changing under the influence of various factors and newer risks are introduced. Rapid changes in science and technology, increasing the complexity of the industry, increased system integration and other factors have been shown to increase total risk in the past few decades. As well, risk management becomes increasingly critical in decreasing...
متن کاملApplication Vulnerabilities in Risk Assessment and Management
The Haruspex suite is an integrated set of tools that adopts a scenario approach to automate ICT risk assessment and management. Each scenario includes an ICT infrastructure under attack by some intelligent attackers with some predefined goals. An attacker can reach its goals only by sequentially composing the attacks. This overcomes the infrastructure complexity and its large number of nodes. ...
متن کاملCitation Apps for Mobile Devices
Purpose – The purpose of this paper is to evaluate the accuracy and functionality of a selection of basic Android and iOS apps for mobile devices designed to generate bibliographic citations. Design/methodology/approach – A number of inexpensive or free apps were installed on several different tablets and phones. Book citations in MLA and APA format were generated and evaluated for accuracy.
متن کاملAppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps
A fundamental security principle in developing networked applications is end-to-end security, where the confidentiality and integrity of the data transmitted over the network do not rely on the security of the network. In response to the ever increasing traffic from mobile apps, WiFi networks are spreading fast and widely. Since WiFi networks are unregulated, a passive attacker may eavesdrop on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture notes in networks and systems
سال: 2021
ISSN: ['2367-3370', '2367-3389']
DOI: https://doi.org/10.1007/978-3-030-80119-9_72