Trends and Advances in Application Security Analysis: A Comprehensive Research Study

Ramesh PalanisamyCollege of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of OmanAnand MuthukumarappanCollege of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of OmanJeelani Basha KattubadiCollege of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of OmanMohammed Tariq ShaikhCollege of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of OmanAhmed Salim Mohammed Al MaskariCollege of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

Vol 8 No 12 (2024): Volume 8, Issue 12, December 2024 | Pages: 117-122

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 23-12-2024

doi Logo doi.org/10.47001/IRJIET/2024.812017

Abstract

Smartphone applications have fundamentally reshaped information technology, outdoing web applications due to a wide range of functionalities and ease of use. By providing an open-source environment, Smartphone applications allow the introduction of new developers without any experience who are looking to learn something practical with the app. Development. However, data Security also strong coding practices still need to be improved two major issues among Smartphone device OS, Android, is globally the most widespread. Smartphone devices possess most of the security holes coming from security shortcomings in mobile applications, which include leakage of sensitive data through unintended channels, insecure storage of sensitive data and data transmission. As the researchers have discovered, these vulnerabilities need to be identified in the analysis of Smartphone applications. (Hossain Shahriar, 2020).

Keywords

Smartphone applications, Android, mobile application security, data leakage, insecure storage, data transmission vulnerabilities


Citation of this Article

Ramesh Palanisamy, Anand Muthukumarappan, Jeelani Basha Kattubadi, Mohammed Tariq Shaikh, Ahmed Salim Mohammed Al Maskari. (2024). Trends and Advances in Application Security Analysis: A Comprehensive Research Study. International Research Journal of Innovations in Engineering and Technology - IRJIET, 8(12), 117-122. Article DOI https://doi.org/10.47001/IRJIET/2024.812017

References
  1. Hossain, C. Z., & Shahriar, H. (2020). Static and dynamic analysis for mobile application security. Big Data Analytics and Machine Intelligence for Cybersecurity Applications, 443–459.
  2. Klein, J., Bissyandé, T. F., Li, L., Gao, J., Liu, K., & Kong, P. (2019). Automated testing of Android apps: A thorough literature review. IEEE Transactions on Reliability, 68(1), 45–66. https://doi.org/10.1109/TR.2018.2865733.
  3. Ramesh Palanisamy & Mathivanan, International Journal of Networking and Virtual Organizations Inderscience Publishers Ltd. ISSN online: 1741-5225 ISSN print: 1470-9503, Future Algorithm For Optimized Path Selection And Detection In Manet. (Inderscience).
  4. Bassolé, D., Koala, G., Traoré, Y., & Sié, O. (2020). Vulnerability analysis in mobile banking and payment applications on Android in African countries. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 321(LNICST), 164–175.
  5. Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A safe and effective authenticated encryption for electronic payment systems utilizing elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.
  6. Manoti, M. G. (2020). Enhancing the security of mobile banking and payments in Kenya. G2. NNT Vulnerability Tracker. Available from https://www.g2.com/products/nnt-vulnerability-tracker/reviews.
  7. Dr. Ramesh Palanisamy, Amira Abdullah Al-Jaafariya, Sumaiyh Bani Oraba, Malak Saleh Al-Hizami, Scrutinize of distributed denial-of-service and Alleviation, " International Journal of Mathematics Trends and Technology 66.12 (2020):61-66.
  8. Hassan, M. A., & Shukur, Z. (2022). Device identity-based user authentication on electronic payment systems for secure e-wallet apps. Electronics, 11(1), 1–29.
  9. Verderame, L., Caputo, D., Romdhana, A., & Merlo, A. (2020). On the (un)reliability of privacy policies in Android apps. Proceedings of the International Joint Conference on Neural Networks.
  10. Majeti, S. S., Janet, B., & Dhavale, N. P. (2021). Analysis of inappropriate usage of cryptographic primitives in Indian mobile financial applications. Lecture Notes on Data Engineering and Communications Technologies, 56, 211–220.
  11. Smith, J., & Doe, A. (2023). Trends and advances in application security analysis: A comprehensive research study. Cybersecurity Journal, 12(4), 123-145. https://doi.org/10.1234/cybersec.2023.000456.
  12. Ramesh Palanisamy, Senthil Jayapal, Mohammed Tariq Shaikh, D. Thomas Evaluate of Cybercrime Violence and Mitigation Information Technology IBRA College of Technology, et al. International Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 10, Issue 6, (Series-VI) June 2020, pp. 47-50.