Download Publication
Mobile Application Security Testing
Release Date: 06/30/2016
Mobile application security testing and vetting processes utilized through MAST involve both static and dynamic analyses to evaluate security vulnerabilities of mobile applications for platforms such as Android, iOS and Windows. These processes cover permissions, exposed communications, potentially dangerous functionality, application collusion, obfuscation, excessive power consumption and traditional software vulnerabilities. It also covers internal communications such as debug flag and activities and external communications such as GPS, NFC access as well as checking the links that are written in the source code. In addition to security testing and vetting, the initiative has also proposed processes and procedures for security incidence response.
The use of mobile applications has become unavoidable, almost a necessity, in today's world. More people are starting to question the security of mobile applications and it's about time that you take a look at what the Cloud Security Alliance has to say about mobile application security!
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Aaron Guzman
Aaron is a passionate information security professional specializing in IoT, embedded, and automotive security. He is co-author of the “IoT Penetration Testing Cookbook” and a technical editor for the "Practical Internet of Things Security” Packt Publishing books. Aaron is co-chair of CSA’s IoT working group as well as a leader for OWASP’s IoT and Embedded Application Security projects; providing practical guidance to address the most commo...
Edward Chiu
Cybersecurity, Chevron IT Company
Edward is a Distinguished Engineer in Cybersecurity at Chevron Technical Center. He serves in CSA's Quantum-Safe Security working group, during which time he authored “Preparing Enterprises for the Quantum Computing Cybersecurity Threats,” and co-authored “A Day Without Safe Cryptography.” His experience includes cybersecurity R&D and operations, ...
Mickey Law
Srinivas Naik
Setumadhav Kulkarni
Lynne Yang
Curtis Kozielec
Timothy G. O’Brien
Douglas Lee
Eric Wang
Mr. Wang has more than 30 years experience in IT domain, he the expert on IT Security, and also professional in ERP, and Linux. He had led may important IT projects, such as emoffice、MEES、ecOS, iBon v1, Jcloud, and Bootable-USB-EasyLock. He is also UWCE/UWSE Implementor、ISO/IEC 17025 Certification、CEH, AutoCad certified, as well as the e-commerce representer in APEC 2009.
Right now, Eric Wang leads CSA “Mobile App Security Testing (MA...
Dong Ji
Keng Lee
Zhan Leilei
Yin Liping
Dean McBride
Porus Mehta
Mark Perry
Jim Pinter
VijayVK Velu
Matt Wehnes
Timothy Grance
Stephen Quirolgico
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more