Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Download Publication

Mobile Application Security Testing
Mobile Application Security Testing

Mobile Application Security Testing

Release Date: 06/30/2016

The Mobile Application Security Testing (MAST) Initiative is a research which aims to help organizations and individuals reduce the possible risk exposures and security threat in using mobile applications. MAST aims define a framework for secure mobile application development, achieving privacy and security by design. Implementation of MAST will result in clearly articulated recommendations and best practices in the use of mobile applications.

Mobile application security testing and vetting processes utilized through MAST involve both static and dynamic analyses to evaluate security vulnerabilities of mobile applications for platforms such as Android, iOS and Windows. These processes cover permissions, exposed communications, potentially dangerous functionality, application collusion, obfuscation, excessive power consumption and traditional software vulnerabilities. It also covers internal communications such as debug flag and activities and external communications such as GPS, NFC access as well as checking the links that are written in the source code. In addition to security testing and vetting, the initiative has also proposed processes and procedures for security incidence response.

The use of mobile applications has become unavoidable, almost a necessity, in today's world. More people are starting to question the security of mobile applications and it's about time that you take a look at what the Cloud Security Alliance has to say about mobile application security!
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Mobile Application Security Testing – Sum-Up & Landscape Overview
Mobile Application Security Testing – Sum-Up & ...
Mobile Application Security Testing (MAST) - Charter
Mobile Application Security Testing (MAST) - Ch...
Mobile Application Security Testing Initiative Revised Charter
Mobile Application Security Testing Initiative ...
What Is Lockdown Mode for iOS and iPadOS and Why Should I Care?
What Is Lockdown Mode for iOS and iPadOS and Why Should I Care?
Published: 10/10/2022
Securing Australia's Critical Infrastructure
Securing Australia's Critical Infrastructure
Published: 08/24/2022
Application Security is Getting Worse, not Better
Application Security is Getting Worse, not Better
Published: 05/19/2021
​The Mobile App Testing Landscape
​The Mobile App Testing Landscape
Published: 07/20/2020

Acknowledgements

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

​Aaron Guzman
​Aaron Guzman

​Aaron Guzman

Aaron is a passionate information security professional specializing in IoT, embedded, and automotive security. He is co-author of the “IoT Penetration Testing Cookbook” and a technical editor for the "Practical Internet of Things Security” Packt Publishing books. Aaron is co-chair of CSA’s IoT working group as well as a leader for OWASP’s IoT and Embedded Application Security projects; providing practical guidance to address the most commo...

Read more

Edward Chiu
Edward Chiu
Cybersecurity, Chevron IT Company

Edward Chiu

Cybersecurity, Chevron IT Company

Edward is a Distinguished Engineer in Cybersecurity at Chevron Technical Center. He serves in CSA's Quantum-Safe Security working group, during which time he authored “Preparing Enterprises for the Quantum Computing Cybersecurity Threats,” and co-authored “A Day Without Safe Cryptography.” His experience includes cybersecurity R&D and operations, ...

Read more

Mickey Law Headshot Missing
Mickey Law

Mickey Law

Srinivas Naik Headshot Missing
Srinivas Naik

Srinivas Naik

Setumadhav Kulkarni Headshot Missing
Setumadhav Kulkarni

Setumadhav Kulkarni

Lynne Yang Headshot Missing
Lynne Yang

Lynne Yang

Curtis Kozielec Headshot Missing
Curtis Kozielec

Curtis Kozielec

Timothy G. O’Brien Headshot Missing
Timothy G. O’Brien

Timothy G. O’Brien

Douglas Lee Headshot Missing
Douglas Lee

Douglas Lee

Eric Wang
Eric Wang

Eric Wang

Mr. Wang has more than 30 years experience in IT domain, he the expert on IT Security, and also professional in ERP, and Linux. He had led may important IT projects, such as emoffice、MEES、ecOS, iBon v1, Jcloud, and Bootable-USB-EasyLock. He is also UWCE/UWSE Implementor、ISO/IEC 17025 Certification、CEH, AutoCad certified, as well as the e-commerce representer in APEC 2009.

Right now, Eric Wang leads CSA “Mobile App Security Testing (MA...

Read more

Dong Ji Headshot Missing
Dong Ji

Dong Ji

Keng Lee Headshot Missing
Keng Lee

Keng Lee

Zhan Leilei Headshot Missing
Zhan Leilei

Zhan Leilei

Yin Liping Headshot Missing
Yin Liping

Yin Liping

Dean McBride Headshot Missing
Dean McBride

Dean McBride

Porus Mehta Headshot Missing
Porus Mehta

Porus Mehta

Mark Perry Headshot Missing
Mark Perry

Mark Perry

Jim Pinter Headshot Missing
Jim Pinter

Jim Pinter

VijayVK Velu Headshot Missing
VijayVK Velu

VijayVK Velu

Matt Wehnes Headshot Missing
Matt Wehnes

Matt Wehnes

Timothy Grance Headshot Missing
Timothy Grance

Timothy Grance

Stephen Quirolgico Headshot Missing
Stephen Quirolgico

Stephen Quirolgico

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training