This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mobile Top 10 2014-M10"
From OWASP
Jason Haddix (talk | contribs) (Created page with "{{Top_10_2010:SubsectionColoredTemplate|<center>Lack of Binary Protections</center>||year=2014}} {{Top_10_2010:SummaryTableHeaderBeginTemplate}} {{Top_10_2010:SummaryTableValu...") |
Jason Haddix (talk | contribs) |
||
Line 14: | Line 14: | ||
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Lack of Binary Protections?||year=2014}} | {{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Lack of Binary Protections?||year=2014}} | ||
− | |||
− | + | The Lack of Binary Protections category considers many security protections (or lack thereof) that are easy to implement but often go unused for mobile applications. Most of these protections are chosen at compile time. In general you should be aware of the following for mobile applications when compiling for production: | |
− | * | + | |
− | * | + | * How to fully enable ASLR and Exploit mitigation protections. |
− | * | + | * How to remove path and symbol information from the binary. |
+ | * How to use/enable framework provided memory management (to avoid memory leaks and code quality issues). | ||
+ | * How to implement simple certificate pinning. | ||
+ | * How to implement simple jailbreak/root detection. | ||
+ | * How to implement simple anti-debugging code. | ||
+ | * How to implement framework provided code obfuscation. | ||
+ | |||
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Lack of Binary Protections?||year=2014}} | {{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Lack of Binary Protections?||year=2014}} | ||
iOS Specific Examples: | iOS Specific Examples: | ||
− | * | + | * |
− | |||
− | |||
Android Specific Examples | Android Specific Examples | ||
Line 35: | Line 38: | ||
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=7}} | {{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=7}} | ||
References | References | ||
− | |||
− |
Revision as of 07:51, 27 January 2014
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | |
---|---|---|---|---|---|
Application Specific | Exploitability EASY |
Prevalence COMMON |
Detectability EASY |
Impact SEVERE |
Application / Business Specific |
Threat Description | Attack Vector Description | Security Weakness Description | Technical Impacts | Business Impacts |
Am I Vulnerable to Lack of Binary Protections?
The Lack of Binary Protections category considers many security protections (or lack thereof) that are easy to implement but often go unused for mobile applications. Most of these protections are chosen at compile time. In general you should be aware of the following for mobile applications when compiling for production:
- How to fully enable ASLR and Exploit mitigation protections.
- How to remove path and symbol information from the binary.
- How to use/enable framework provided memory management (to avoid memory leaks and code quality issues).
- How to implement simple certificate pinning.
- How to implement simple jailbreak/root detection.
- How to implement simple anti-debugging code.
- How to implement framework provided code obfuscation.
How Do I Prevent Lack of Binary Protections?
iOS Specific Examples:
Android Specific Examples
Example Scenarios
Example Scenarios
References
References