Главная
Study mode:
on
1
Intro
2
Hybrid mobile apps
3
The architecture of Apache Cordova
4
Example app
5
One framework, many names
6
Cordova in the real world
7
What we have learned: plugin use
8
Why is it hard to the the security of hybrid apps
9
Example: Get Phone Number
10
Weak spot: JS Java bridge
11
Exploiting the JavaScript to Java bridge (CVE-2013-4710)
12
Never use http without SSL, or even iframes! Device
13
Recommendations: the (hopefully) obvious parts
14
Recommendations: we should not forget
15
Did you know
16
Recommendation: use the latest framework version
17
If you are using static analysis: Considerations
18
If you are using static analysis: Recommendations
19
If you are using dynamic analysis (e... pen testing)
20
Conclusion
Description:
Explore the security risks and best practices for developing hybrid mobile apps in this 37-minute conference talk from AppSec EU 2017. Delve into the architecture of Apache Cordova and learn about specific attacks targeting hybrid apps. Discover how Android developers are utilizing Apache Cordova in real-world scenarios. Gain hands-on guidelines for defensive programming and recommendations for hybrid app-specific security testing strategies. Examine weak spots in the JavaScript to Java bridge and understand the importance of using SSL. Learn about considerations for static and dynamic analysis, and receive practical recommendations for securing hybrid apps. Equip yourself with the knowledge to combine native and web development securely in the evolving landscape of cross-platform mobile app development.

Combining Security Risks of Native and Web Development in Hybrid Apps - AppSec EU 2017

OWASP Foundation
Add to list
0:00 / 0:00