Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques
The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.
Main Authors: | T. R. Khabibullin, A. G. Beltov, I. Y. Zhukov, A. V. Zuykov, A. S. Smirnov |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2012-09-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/449 |
Similar Items
-
Attacks on Mobile Phones that Use the Vulnerability of NFC Technology
by: A. V. Starikovskiy, et al.
Published: (2012-09-01) -
Security Problems of Mobile Technologies
by: A. G. Beltov, et al.
Published: (2012-09-01) -
Attacks on Mobile Phones that Use the Automatic Configuration Mechanism
by: A. G. Beltov, et al.
Published: (2012-09-01) -
Buffer Overflow Exploits
by: Khurram Farooq, et al.
Published: (2003-12-01) -
Using simplex method in verifying software safety
by: Vujošević-Janičić Milena, et al.
Published: (2009-01-01)