This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Mobile Security Project"
From OWASP
m (updated archive with url) |
|||
(27 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
=Main= | =Main= | ||
− | |||
− | |||
− | |||
− | |||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
Line 10: | Line 6: | ||
[[File:OWASP_Mobile_Logo_Milan.PNG|center ]] | [[File:OWASP_Mobile_Logo_Milan.PNG|center ]] | ||
− | + | ||
+ | == Maintenance notice == | ||
+ | |||
+ | This site is no longer maintained: please go to https://www2.owasp.org/www-project-mobile-security/ for our new website! | ||
The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation. | The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation. | ||
− | The project is a breading ground for many different mobile security projects within OWASP. Right now, you can find the following active mobile security projects | + | The project is a breading ground for many different mobile security projects within OWASP. Right now, you can find the following active OWASP mobile security projects: |
{| class="wikitable" | {| class="wikitable" | ||
!Project/deliverable | !Project/deliverable | ||
− | !More info | + | !More info: |
!Description: | !Description: | ||
!Current leaders | !Current leaders | ||
Line 24: | Line 23: | ||
|[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Project Page] | |[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Project Page] | ||
|The OWASP Mobile Security top 10 is created to raise awareness for the current mobile security issues. | |The OWASP Mobile Security top 10 is created to raise awareness for the current mobile security issues. | ||
− | | | + | | |
+ | * [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify] | ||
+ | * [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify] | ||
+ | * [mailto:jonthan.carter@owasp.org Jonathan Carter - Arxan Technologies] | ||
+ | *[mailto:milan@owasp.org Milan Singh Thakur] | ||
|- | |- | ||
|Mobile Security Testing Guide | |Mobile Security Testing Guide | ||
|[[OWASP Mobile Security Testing Guide|Project Page]] | |[[OWASP Mobile Security Testing Guide|Project Page]] | ||
|A comprehensive manual for mobile app security testing and reverse engineering for iOS and Android mobile security testers as well as developers. | |A comprehensive manual for mobile app security testing and reverse engineering for iOS and Android mobile security testers as well as developers. | ||
− | | | + | | |
+ | * [mailto:sven.schleier@owasp.org Sven Schleier] | ||
+ | * [mailto:jeroen.willemsen@owasp.org Jeroen Willemsen] | ||
+ | * [mailto:carlos.holguera@owasp.org Carlos Holguera] | ||
|- | |- | ||
|Mobile Application Security Verification Standard | |Mobile Application Security Verification Standard | ||
|[[OWASP Mobile Security Testing Guide|Project Page]] | |[[OWASP Mobile Security Testing Guide|Project Page]] | ||
|A standard for mobile app security which outlines the security requirements of a mobile application. | |A standard for mobile app security which outlines the security requirements of a mobile application. | ||
− | | | + | | |
+ | * [mailto:sven.schleier@owasp.org Sven Schleier] | ||
+ | * [mailto:jeroen.willemsen@owasp.org Jeroen Willemsen] | ||
+ | * [mailto:carlos.holguera@owasp.org Carlos Holguera] | ||
|- | |- | ||
|Mobile Security Checklist | |Mobile Security Checklist | ||
|[[OWASP Mobile Security Testing Guide|Project Page]] | |[[OWASP Mobile Security Testing Guide|Project Page]] | ||
|A checklist which allows easy mapping and scoring of the requirements from the Mobile Application Security Verification Standard based on the Mobile Security Testing Guide. | |A checklist which allows easy mapping and scoring of the requirements from the Mobile Application Security Verification Standard based on the Mobile Security Testing Guide. | ||
− | | | + | | |
+ | * [mailto:sven.schleier@owasp.org Sven Schleier] | ||
+ | * [mailto:jeroen.willemsen@owasp.org Jeroen Willemsen] | ||
+ | * [mailto:carlos.holguera@owasp.org Carlos Holguera] | ||
+ | |- | ||
+ | |iGoat Tool Project | ||
+ | |[[OWASP iGoat Project|Project Page]] | ||
+ | |A learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it. | ||
+ | | | ||
+ | * [mailto:swaroop.yermalkar@owasp.org Swaroop Yermalkar] | ||
+ | |- | ||
+ | |Damn Vulnerable iOS Application | ||
+ | |[[OWASP DVIA|Project Page]] | ||
+ | |An iOS application that is damn vulnerable. Its main goal is to provide a platform to mobile security enthusiasts/professionals or students to test their iOS penetration testing skills in a legal environment. | ||
+ | | | ||
+ | * [https://twitter.com/prateekg147 Prateek Gianchandani] | ||
+ | |- | ||
+ | |Android CK project | ||
+ | |[[Projects/OWASP Androick Project|Project Page]] | ||
+ | |A python tool to help in forensics analysis on android. | ||
+ | | | ||
+ | * [https://twitter.com/phonesec Florian Pradines] | ||
+ | |- | ||
+ | |Seraphimdroid | ||
+ | |[[OWASP SeraphimDroid Project|Project Page]] | ||
+ | |A privacy and security protection app for Android devices. | ||
+ | | | ||
+ | * [mailto:nikola.milosevic@owasp.org Nikola Milosevic] | ||
+ | * [mailto:kartik.kholi@owasp.org Kartik Kholi] | ||
+ | |||
|} | |} | ||
− | + | Not what you are looking for? Please have a look at the '''[https://www.owasp.org/index.php/Mobile_Security_Project_Archive Mobile Security Page Archive]''' | |
+ | |||
+ | Want to start a new mobile security project? Follow https://www.owasp.org/index.php/Category:OWASP_Project#Starting_a_New_Project or contact one of the leaders of the active projects. | ||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Active OWASP mobile projects == |
− | + | * [[OWASP Mobile Security Testing Guide|OWASP Mobile Security Testing Guide]] | |
− | [[ | + | * [[OWASP Mobile Security Testing Guide|OWASP Mobile Application Security Verification Standard]] |
+ | * [[OWASP iGoat Tool Project]] | ||
+ | * [[OWASP DVIA|Damn Vulnerable iOS Application]] | ||
+ | * [[Projects/OWASP Androick Project|AndroidCK project]] | ||
+ | * [[OWASP SeraphimDroid Project|OWASP SeraphimDroid]] | ||
|} | |} | ||
Line 54: | Line 98: | ||
= Top 10 Mobile Risks = | = Top 10 Mobile Risks = | ||
− | Please visit the [ | + | Please visit the [[OWASP Mobile Top 10|project page]] for current information. |
== About this list == | == About this list == | ||
Line 103: | Line 147: | ||
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO] | ** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO] | ||
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]] | ** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]] | ||
+ | |||
+ | = Mobile Security Testing Guide = | ||
+ | |||
+ | Please see the [https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide project page] for more details. | ||
=Acknowledgements = | =Acknowledgements = | ||
Line 187: | Line 235: | ||
| username = Stephanie V | | username = Stephanie V | ||
}}<br /> | }}<br /> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
= Secure M-Development = | = Secure M-Development = | ||
Line 304: | Line 240: | ||
The OWASP Secure Development Guidelines provides developers with the knowledge they need to build secure mobile applications. An extendable framework will be provided that includes the core security flaws found across nearly all mobile platforms. It will be a living reference where contributors can plug in newly exposed APIs for various platforms and provide good/bad code examples along with remediation guidance for those issues. | The OWASP Secure Development Guidelines provides developers with the knowledge they need to build secure mobile applications. An extendable framework will be provided that includes the core security flaws found across nearly all mobile platforms. It will be a living reference where contributors can plug in newly exposed APIs for various platforms and provide good/bad code examples along with remediation guidance for those issues. | ||
+ | |||
+ | == Status note == | ||
+ | '''Note: Given that the MASVS/MSTG is becoming the leading framework in terms of requirements, we will archive this page and merge requirements with the MASVS, this process is currently taken care of by Abderrahmane AFTAHI (see [https://github.com/OWASP/owasp-masvs/issues/189 the github issue for more details]) and Rocco Gränitz (see [https://github.com/OWASP/owasp-masvs/issues/203 the github issue for more details])''' | ||
== Mobile Application Coding Guidelines == | == Mobile Application Coding Guidelines == | ||
Line 446: | Line 385: | ||
[[File:OWASP_Mobile_Top_10_Controls.jpg|center|800px]] | [[File:OWASP_Mobile_Top_10_Controls.jpg|center|800px]] | ||
+ | |||
+ | |||
+ | == Status note == | ||
+ | '''Note: Given that the MASVS/MSTG is becoming the leading framework in terms of requirements, we will archive this page and merge requirements with the MASVS, this process is currently taken care of by Abderrahmane AFTAHI (see [https://github.com/OWASP/owasp-masvs/issues/189 the github issue for more details]) and Rocco Gränitz (see [https://github.com/OWASP/owasp-masvs/issues/203 the github issue for more details])''' | ||
==Contributors== | ==Contributors== | ||
Line 640: | Line 583: | ||
This is the first release (February 2013) of the Mobile Application Threat Model developed by the initial project team (listed at the end of this release). Development began mid-2011 and is being released in beta form for public comment and input. It is by no means complete and some sections will need more contributions, details and also real world case studies. It's the hope of the project team that others in the community can help contribute to this project to further enhance and improve this threat model. | This is the first release (February 2013) of the Mobile Application Threat Model developed by the initial project team (listed at the end of this release). Development began mid-2011 and is being released in beta form for public comment and input. It is by no means complete and some sections will need more contributions, details and also real world case studies. It's the hope of the project team that others in the community can help contribute to this project to further enhance and improve this threat model. | ||
+ | |||
+ | === Maintenance note === | ||
+ | |||
+ | We are in the process of creating a new threatmodel. Want to join? Drop a line at [https://github.com/OWASP/OWASP-Mobile-Threatmodel our threatmodel git]. | ||
===Mobile Threat Model Introduction Statement=== | ===Mobile Threat Model Introduction Statement=== |