...
首页> 外文期刊>Procedia Computer Science >Peeking and Testing Broken Object Level Authorization Vulnerability onto E-Commerce and E-Banking Mobile Applications
【24h】

Peeking and Testing Broken Object Level Authorization Vulnerability onto E-Commerce and E-Banking Mobile Applications

机译:在电子商务和电子银行移动应用程序上偷看和测试破碎的对象级别授权漏洞

获取原文
           

摘要

Internet traffic is already a daily usage and unavoidable for many people, moreover, people needs it anywhere and anytime, so that more companies tend to fulfill that desire onto bringing some of the application to mobile devices. This research aim to find out whether the mobile application security has been the prioritize for the company or not. Several mobile applications has been tested ethically and legal in two impactful industries in Indonesia, E-Commerce and Banking. Several findings has been found in the mobile application just tested by using Broken Object Level Authorization which is the first point of top ten OWASP vulnerabilities. All attacks conducted are not complicated to reproduce, malicious user only need to know the basic of request interception in mobile phone or web application, the attack could be done by using any free proxy software. High dependency only on Jailbreak Detection, Root Detection and SSL Pinning as the main security protocol is not a wise decision to be taken.
机译:互联网流量已经是每日使用,而且对许多人来说是不可避免的,而且人们随时随地都需要它,因此更多的公司倾向于满足将一些应用程序带到移动设备上。这项研究旨在了解移动应用程序安全是否已成为公司的优先级。在印度尼西亚,电子商务和银行业务的两个受影响的行业中,几个移动应用已经过了经历了道德和法律。在刚刚使用破损的对象级别授权测试的移动应用程序中发现了几种调查结果,这是前十大OWASP漏洞的第一点。传出的所有攻击都没有复制,恶意用户只需要知道在手机或Web应用程序中的请求拦截的基本,可以使用任何免费代理软件来完成攻击。只有越狱检测,根检测和SSL Pinning的高依赖性,因为主要安全协议不是明智的决定。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号