Open Access Open Access  Restricted Access Subscription Access

Mobile Application Security : Threats,Vulnerabilities, and Countermeasures

Mr. Gopal Khorwal, Mrs Ruchi Banarjee, Mr. Aman Kumar

Abstract


Mobile applications have become integral to modern society, supporting services in banking, healthcare, education, and communication. However, the widespread use of mobile apps has also created new security challenges. This paper explores the major threats and vulnerabilities associated with mobile applications and analyzes countermeasures that can mitigate risks. Emphasis is placed on secure coding practices, authentication mechanisms, data protection strategies, and emerging solutions such as blockchain and machine learning-based anomaly detection. The study concludes with recommendations for developers, organizations, and policymakers to enhance mobile security resilience.

 


Full Text:

PDF

References


Conti, M., Dragoni, N., & Lesyk, V. (2016). A Survey of Security and Privacy Issues in Mobile Devices. IEEE Communications Surveys & Tutorials, 18(1), 448–472.

Alotaibi, F., & Almagwashi, H. (2021). Security Challenges of Mobile Applications: A Survey. International Journal of Computer Applications, 183(22), 1–8.

OWASP. (2023). Mobile Application Security Verification Standard (MASVS). Retrieved from https://owasp.org/www-project-mobile-security/

Verizon. (2023). Data Breach Investigations Report (DBIR). Verizon Enterprise Solutions.

Statista. (2024). Number of Smartphone Users Worldwide. Retrieved from https://www.statista.com/

Shabtai, A., Fledel, Y., & Elovici, Y. (2010). Securing Android-Powered Mobile Devices Using SELinux. IEEE Security & Privacy, 8(3), 36–44.

Zhou, Y., & Jiang, X. (2012). Dissecting Android Malware: Characterization and Evolution. IEEE Symposium on Security and Privacy, 95–109.

Arabo, A. (2012). Mobile Security: A Survey of Smart Phone Security Threats and Defenses. International Conference on Cyber Security, 297–303.

Felt, A. P., Finifter, M., Chin, E., Hanna, S., & Wagner, D. (2011). A Survey of Mobile Malware in the Wild. ACM Conference on Security and Privacy in Wireless and Mobile Networks, 3–14.

ENISA. (2023). Threat Landscape for Mobile Applications. European Union Agency for Cybersecurity.


Refbacks

  • There are currently no refbacks.