This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Difference between revisions of "Category:Unsafe Mobile Code"

Jump to: navigation, search
Line 1: Line 1:
This category is for tagging vulnerabilities associated with mobile code.
For more information on mobile security, please visit the [[OWASP Mobile Security Project]].
Mobile code, such as a Java Applet, is code that is transmitted across a network and executed on a remote machine. Because mobile code developers have little if any control of the environment in which their code will execute, special security concerns become relevant. One of the biggest environmental threats results from the risk that the mobile code will run side-by-side with other, potentially malicious, mobile code. Because all of the popular web browsers execute code from multiple sources together in the same JVM, many of the security guidelines for mobile code are focused on preventing manipulation of your objects' state and behavior by adversaries who have access to the same virtual machine where your program is running.

Latest revision as of 19:27, 5 April 2014

For more information on mobile security, please visit the OWASP Mobile Security Project.

This category currently contains no pages or media.