Understanding The Risks of Mobile Apps
Understanding The Risks of Mobile Apps
Understanding The Risks of Mobile Apps
Background
Modern mobile applications run on mobile devices that have the functionality of a desktop or laptop running a general purpose operating system. In this respect many of the risks are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. Mobile devices are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Threat Model
The threat model is different for mobile devices. There is much more risk to private data being stolen or leaked due to the portable nature of the devices and the types of applications that are used. Here is a list of some of the significant difference from traditional computing environments: - Mobile devices are frequently shared temporarily - Mobile apps are highly connected to web services - Mobile apps interact with device sensors such as microphones, cameras, and location detection. - Mobile devices have payment capability - Mobile devices are often consumer owned devices that can access an organizations internal network - Mobile devices must communicate over a wireless network - Mobile devices have a higher likelihood of being lost or stolen - Mobile apps are delivered from an app store - Mobile apps are updated frequently
Many security experts are waiting for a mobile email worm attack or a mobile bot network to spring up before they agree that there are significant mobile computing risks. While these things could happen and happen soon there are other risks that have already been brought to light through real world incidents. Many of these incidents are the basis of the Top 10 Mobile App Risks which Veracode created to highlight the most serious risks from mobile applications.
If an App store is not required is means that the user is free to choose an app store or download apps directly from the web. If the user wants to get the security benefits of an app store approval process they will need to restrict their app installation from only the platform app store.
Solutions
Veracode provides the worlds leading application risk management platform. Veracodes patented and proven solution leverages static binary analysis to provide unique coverage for mobile applications. Organizations can use Veracode to provide attestation of the security of mobile applications they develop, or to verify that the mobile applications they purchase and distribute are free from security issues. Mobile application need to be tested for vulnerabilities just like any other application with access to data or access to transactions that need to be protected. Static binary analysis is an excellent technique for testing mobile apps. Mobile applications may have several types of security risk: language inherent risk, based on common security flaws in the language; malicious data exfiltration, in which sensitive data is surreptitiously transmitted from the phone; and platform specific risk, based on specific vulnerabilities inherent in the mobile platform. Specific examples are discussed below.
Conclusion
Every new information technology platform delivers new benefits and new risks. Applications running on these platforms contribute a large portion of the risk. Veracodes Application Risk Management approach is to cover all software that puts an organization at risk no matter the source: vendor, internally developed, open source or outsourced. Mobile applications are no different. Whether you are building mobile apps or purchasing them for your workforce they should be independently analyzed for the top risks.
About Veracode
Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide including Global 2000 brands such as Barclays PLC and Computershare as well as the California Public Employees Retirement System (CalPERS) and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the ZeroDay Labs blog.
WHITE PAPER
Veracode, Inc. 4 Van de Graaff Drive Burlington, MA 01803 Tel +1.781.425.6040 Fax +1.781.425.6039 www.veracode.com 2011 Veracode, Inc. All rights reserved.
WP/MOBILE/0211