Skip to main content

Towards Secure Password Protection in Portable Applications

  • Conference paper
  • First Online:
National Cyber Summit (NCS) Research Track (NCS 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1055))

Included in the following conference series:

Abstract

The security dangers to mobile and web applications are developing explosively. Programming security has now turned into a more extensive security idea. Secure software development is fundamental and vital for Confidentiality, Integrity, and Availability of all product applications. Most vulnerabilities should be resolved in the versatile programming implementation stage. However, most application developers frequently spend little or no effort for security bugs remediation, as they are generally entrusted for undertaking due dates. Moreover, most developers are unaware of secure coding or cryptography from the degree programs they have obtained from schools. Software security for secure portable and web application advancement is of enormous interests in the Information Technology fields. In this paper, we proposed and developed an innovative learning module based on several real world scenarios to broaden and promote for secure software development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Projects/OWASP Mobile Security Project - Top Ten Mobile Risks (2019). www.owasp.org/index.php/OWASP_Mobile_Security_Project

  2. OWASP Top 10 Proactive Controls (2018). https://www.owasp.org/index.php/OWASP_Proactive_Controls

  3. Palmerino, J.: Improving android permissions models for increased user awareness and security. In: Proceedings of the 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), pp. 41–42, May 2018

    Google Scholar 

  4. Willocx, M., Vossaert, J., Naessens, V.: Security analysis of cordova applications in Google play. In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), pp. 1–7, August 2017

    Google Scholar 

  5. Computer Science Curricula 2013 Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. https://www.acm.org/binaries/content/assets/education/cs2013_web_final.pdf

  6. Peruma, A., Krutz, D.E.: Understanding the relationship between quality and security: a large-scale analysis of Android applications. In: Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD 2018, pp. 19–25, May 2018

    Google Scholar 

  7. Geethanjali, D., Ying, T.L., Melissa, C.W.J., Balachandran, V.: AEON: android encryption based obfuscation. In: Proceedings of the 8th ACM Conference on Data and Application Security and Privacy, pp. 146–148, March 2018

    Google Scholar 

  8. Biswas, S., Sajal, M.M.H.K., Afrin, T., Bhuiyan, T., Hassan, M.M.: A study on remote code execution vulnerability in web applications. In: International Conference on Cyber Security and Computer Science (ICONCS 2018) (2018)

    Google Scholar 

  9. Amorso, E.: Recent progress in software security. IEEE Softw. 35, 11–13 (2018)

    Article  Google Scholar 

  10. Theisen, C., Williams, L., Oliver, K., Murphy-Hill, E.: Software security education at scale. In: Proceedings of 2016 IEEE/ACM 38th IEEE International Conference on Software Engineering Companion, Austin, TX, USA, pp. 346–355 (2016)

    Google Scholar 

  11. Pistoia, M., Tripp, O., Ferrara, P., Centonze, P.: Automatic detection, correction, and visualization of security vulnerabilities in mobile apps. In: Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, pp. 35–36, October 2015

    Google Scholar 

  12. Peruma, A., Malachowsky, S.A., Krutz, D.E.: Providing an experiential cybersecurity learning experience through mobile security labs. In: Proceedings of IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment, Gothenburg, Sweden, 27 May 2018, pp. 51–54. ACM, New York (2018)

    Google Scholar 

  13. Hands on labs for security Education. http://www.cis.syr.edu/~wedu/seed/index.html

  14. NIST Special publication. https://pages.nist.gov/800–63-3/sp800-63b.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hossain Shahriar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shahriar, H., Shalan, A., Tarmissi, K. (2020). Towards Secure Password Protection in Portable Applications. In: Choo, KK., Morris, T., Peterson, G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. https://doi.org/10.1007/978-3-030-31239-8_1

Download citation

Publish with us

Policies and ethics