Trends and Advances in Application Security Analysis: A Comprehensive Research Study

Abstract

Smartphone applications have fundamentally reshaped information technology, outdoing web applications due to a wide range of functionalities and ease of use. By providing an open-source environment, Smartphone applications allow the introduction of new developers without any experience who are looking to learn something practical with the app. Development. However, data Security also strong coding practices still need to be improved two major issues among Smartphone device OS, Android, is globally the most widespread. Smartphone devices possess most of the security holes coming from security shortcomings in mobile applications, which include leakage of sensitive data through unintended channels, insecure storage of sensitive data and data transmission. As the researchers have discovered, these vulnerabilities need to be identified in the analysis of Smartphone applications. (Hossain Shahriar, 2020).

Country : Sultanate of Oman

1 Ramesh Palanisamy2 Anand Muthukumarappan3 Jeelani Basha Kattubadi4 Mohammed Tariq Shaikh5 Ahmed Salim Mohammed Al Maskari

  1. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  2. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  3. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  4. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman
  5. College of Computing and Information Sciences, University of Technology and Applied Sciences – Ibra, Sultanate of Oman

IRJIET, Volume 8, Issue 12, December 2024 pp. 117-122

doi.org/10.47001/IRJIET/2024.812017

References

  1. Hossain, C. Z., & Shahriar, H. (2020). Static and dynamic analysis for mobile application security. Big Data Analytics and Machine Intelligence for Cybersecurity Applications, 443–459.
  2. Klein, J., Bissyandé, T. F., Li, L., Gao, J., Liu, K., & Kong, P. (2019). Automated testing of Android apps: A thorough literature review. IEEE Transactions on Reliability, 68(1), 45–66. https://doi.org/10.1109/TR.2018.2865733.
  3. Ramesh Palanisamy & Mathivanan, International Journal of Networking and Virtual Organizations Inderscience Publishers Ltd. ISSN online: 1741-5225 ISSN print: 1470-9503, Future Algorithm For Optimized Path Selection And Detection In Manet. (Inderscience).
  4. Bassolé, D., Koala, G., Traoré, Y., & Sié, O. (2020). Vulnerability analysis in mobile banking and payment applications on Android in African countries. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 321(LNICST), 164–175.
  5. Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A safe and effective authenticated encryption for electronic payment systems utilizing elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.
  6. Manoti, M. G. (2020). Enhancing the security of mobile banking and payments in Kenya. G2. NNT Vulnerability Tracker. Available from https://www.g2.com/products/nnt-vulnerability-tracker/reviews.
  7. Dr. Ramesh Palanisamy, Amira Abdullah Al-Jaafariya, Sumaiyh Bani Oraba, Malak Saleh Al-Hizami, Scrutinize of distributed denial-of-service and Alleviation, " International Journal of Mathematics Trends and Technology 66.12 (2020):61-66.
  8. Hassan, M. A., & Shukur, Z. (2022). Device identity-based user authentication on electronic payment systems for secure e-wallet apps. Electronics, 11(1), 1–29.
  9. Verderame, L., Caputo, D., Romdhana, A., & Merlo, A. (2020). On the (un)reliability of privacy policies in Android apps. Proceedings of the International Joint Conference on Neural Networks.
  10. Majeti, S. S., Janet, B., & Dhavale, N. P. (2021). Analysis of inappropriate usage of cryptographic primitives in Indian mobile financial applications. Lecture Notes on Data Engineering and Communications Technologies, 56, 211–220.
  11. Smith, J., & Doe, A. (2023). Trends and advances in application security analysis: A comprehensive research study. Cybersecurity Journal, 12(4), 123-145. https://doi.org/10.1234/cybersec.2023.000456.
  12. Ramesh Palanisamy, Senthil Jayapal, Mohammed Tariq Shaikh, D. Thomas Evaluate of Cybercrime Violence and Mitigation Information Technology IBRA College of Technology, et al. International Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 10, Issue 6, (Series-VI) June 2020, pp. 47-50.