2015 IEEE World Congress on Services 2015
DOI: 10.1109/services.2015.35
|View full text |Cite
|
Sign up to set email alerts
|

A Testbed and Process for Analyzing Attack Vectors and Vulnerabilities in Hybrid Mobile Apps Connected to Restful Web Services

Abstract: Web traffic is increasingly trending towards mobile devices driving developers to tailor web content to small screens and customize web apps using mobile-only capabilities such as geo-location, accelerometers, offline storage, and camera features. Hybrid apps provide a cross-platform, device independent, means for developers to utilize these features. They work by wrapping web-based code, i.e., HTML5, CSS, and JavaScript, in thin native containers that expose device features. This design pattern encourages re-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Attack vectors can also be exploited to gain access to sensitive data, personally identifiable information (PII) and other sensitive information that would result in a data breach. It tries to exploit the vulnerabilities in a device or a network [63].There are several invasion vectors associated with the Internet of Nano Things system that need to be handled by implementing the required security measures to reduce against.…”
Section: Invasion Vectors In Internet Of Nano Things (Iont)mentioning
confidence: 99%
“…Attack vectors can also be exploited to gain access to sensitive data, personally identifiable information (PII) and other sensitive information that would result in a data breach. It tries to exploit the vulnerabilities in a device or a network [63].There are several invasion vectors associated with the Internet of Nano Things system that need to be handled by implementing the required security measures to reduce against.…”
Section: Invasion Vectors In Internet Of Nano Things (Iont)mentioning
confidence: 99%
“…In studies on mobile security, we tend to encounter discussions on attack surfaces (e.g. [28,29,30]), ecosystem vulnerabilities (e.g. [31]), and investigations of app-level security measures through permissions (e.g.…”
Section: Mobile Computingmentioning
confidence: 99%