SlideShare a Scribd company logo
Android App Security
Develop a secure android app
Contents
Introduction to security in Android app
Maintain secure communication with other apps
Secure network communication
Security on data storage
Secure WebViews
Proguard or R8
Introduction to Security in Android app
Mobile app security is the practice of safeguarding high-value mobile applications and
the digital identity from fraudulent attack in all its forms. This includes tampering,
reverse engineering, malware, key loggers, and other forms of manipulation or
interference.
Mobile app security is securing apps from external threats like viruses and other cyber
threats. These viruses and cyber threats may risk financial and other critical data from
hackers. Security of mobile applications has become parallelly crucial in today's digital
environment.
Maintain Secure communication with other
Apps
01 Use Implicit Intents
Do not name a specific component,
but instead declare a general
action to perform, which allows a
component from another app to
handle it.
Maintain Secure communication with other
Apps
02 Non-exported content providers
Using exported as ‘true’ means allowing other apps to use it. Use false for
securing the activity or provider.
Secure network communication
The Network Security Configuration feature lets you customize your
app's network security settings in a safe, declarative configuration
file without modifying app code.
The Network Security Configuration feature uses an XML file where
you specify the settings for your app. You must include an entry in
your app's manifest to point to this file.
Secure network communication
In the configuration file use ‘cleartextTrafficPermitted’ as false.
This means it will not allow the application to use plain http calls.
Here we can mention the secure domains that we need in our
application.
Security on Data storage
To save sensitive information of files used in the application or to send sensitive
data over the network use Cryptography. Cryptography is the most efficient way
to achieve data security.
Cryptography techniques include confidentiality, integrity, non-repudiation, and
authentication.The many examples of cryptography are DES, AES, RSA, and
Diffie-Hellman key exchange.
Security on Data storage
01 Symmetric-key (Secret-key)
Used to transmit big data.
Symmetric Encryption uses a single
key for encryption and decryption.
Symmetric encryption is fast
technique
RC4, AES, DES, 3DES, and QUAD.
02 Asymmetric-key (Public-key)
Used to transmit small data.
Asymmetric Encryption uses two keys for
encryption and decryption
Asymmetric encryption is slower in terms
of speed.
RSA, Diffie-Hellman, ECC algorithms.
Security on Data storage
Storing private data within Internal storage.
Use External storage cautiously.
Store only non-sensitive data in cache files.
Use SharedPreferences in private mode by using MODE_PRIVATE.
Use Encrypted Shared Preferences.
Secure Webviews
If the application does not directly use java script within the WebView
then do not call - JavaScriptEnabled(true).
Enabling true means any attacker can inject his JavaScript that will
give him control.
Proguard or R8
Shrink, obfuscate, and
optimize your code with
the R8 compiler.
This make the application
code short and using
reverse engineering will
not provide the actual
code.
Thank you!

More Related Content

Similar to Android App Security.pptx

Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
CSCJournals
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
TecsyntSolutions
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
STS
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT
 
Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
Tara Arnold
 
Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
Mediacurrent
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
Appknox
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
chWaqasZahid
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
PrernaThakwani
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
IRJET Journal
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Nikhil Khunteta
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
GulshanAra14
 
Securing Cloud Data The Role of Cryptography.pdf
Securing Cloud Data The Role of Cryptography.pdfSecuring Cloud Data The Role of Cryptography.pdf
Securing Cloud Data The Role of Cryptography.pdf
vdoitseo
 
Mobile App Security - Best Practices
Mobile App Security - Best PracticesMobile App Security - Best Practices
Mobile App Security - Best Practices
RedBlackTree
 
Moodle Monkey PPTs
Moodle Monkey PPTsMoodle Monkey PPTs
Moodle Monkey PPTs
ZomakSoluion
 

Similar to Android App Security.pptx (20)

Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Multi-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data EncryptionMulti-part Dynamic Key Generation For Secure Data Encryption
Multi-part Dynamic Key Generation For Secure Data Encryption
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
 
Security by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal SecuritySecurity by design: An Introduction to Drupal Security
Security by design: An Introduction to Drupal Security
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Securing Cloud Data The Role of Cryptography.pdf
Securing Cloud Data The Role of Cryptography.pdfSecuring Cloud Data The Role of Cryptography.pdf
Securing Cloud Data The Role of Cryptography.pdf
 
Mobile App Security - Best Practices
Mobile App Security - Best PracticesMobile App Security - Best Practices
Mobile App Security - Best Practices
 
Moodle Monkey PPTs
Moodle Monkey PPTsMoodle Monkey PPTs
Moodle Monkey PPTs
 

Recently uploaded

Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
ynanesn
 
Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
sozta
 
Introduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.pptIntroduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.ppt
judy milly
 
Flinders degree offer diploma Transcript
Flinders degree offer diploma TranscriptFlinders degree offer diploma Transcript
Flinders degree offer diploma Transcript
sozta
 
MQU degree offer diploma Transcript
MQU degree offer diploma TranscriptMQU degree offer diploma Transcript
MQU degree offer diploma Transcript
ynanesn
 
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
Owen Wu
 
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
margaretblush
 
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
dizzycaye
 
RMIT degree offer diploma Transcript
RMIT degree offer diploma TranscriptRMIT degree offer diploma Transcript
RMIT degree offer diploma Transcript
sozta
 
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDeliverybangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
Jasmine Rawat
 
Monash degree offer diploma Transcript
Monash degree offer diploma TranscriptMonash degree offer diploma Transcript
Monash degree offer diploma Transcript
ynanesn
 

Recently uploaded (11)

Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
 
Bond degree offer diploma Transcript
Bond degree offer diploma TranscriptBond degree offer diploma Transcript
Bond degree offer diploma Transcript
 
Introduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.pptIntroduction_to_Wireless_Communication_R.ppt
Introduction_to_Wireless_Communication_R.ppt
 
Flinders degree offer diploma Transcript
Flinders degree offer diploma TranscriptFlinders degree offer diploma Transcript
Flinders degree offer diploma Transcript
 
MQU degree offer diploma Transcript
MQU degree offer diploma TranscriptMQU degree offer diploma Transcript
MQU degree offer diploma Transcript
 
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
TGDF 2024 Unreal Lumen with Arm Immortalis : The Best Practices of Ray Tracin...
 
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Marol Naka 9910780858 Provide Best And Top Girl Service And No1 in...
 
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
Celebrity Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And ...
 
RMIT degree offer diploma Transcript
RMIT degree offer diploma TranscriptRMIT degree offer diploma Transcript
RMIT degree offer diploma Transcript
 
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDeliverybangalore Girls call  👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
bangalore Girls call 👀 XXXXXXXXXXX 👀 Cash Payment With Room DeliveryDelivery
 
Monash degree offer diploma Transcript
Monash degree offer diploma TranscriptMonash degree offer diploma Transcript
Monash degree offer diploma Transcript
 

Android App Security.pptx

  • 1. Android App Security Develop a secure android app
  • 2. Contents Introduction to security in Android app Maintain secure communication with other apps Secure network communication Security on data storage Secure WebViews Proguard or R8
  • 3. Introduction to Security in Android app Mobile app security is the practice of safeguarding high-value mobile applications and the digital identity from fraudulent attack in all its forms. This includes tampering, reverse engineering, malware, key loggers, and other forms of manipulation or interference. Mobile app security is securing apps from external threats like viruses and other cyber threats. These viruses and cyber threats may risk financial and other critical data from hackers. Security of mobile applications has become parallelly crucial in today's digital environment.
  • 4. Maintain Secure communication with other Apps 01 Use Implicit Intents Do not name a specific component, but instead declare a general action to perform, which allows a component from another app to handle it.
  • 5. Maintain Secure communication with other Apps 02 Non-exported content providers Using exported as ‘true’ means allowing other apps to use it. Use false for securing the activity or provider.
  • 6. Secure network communication The Network Security Configuration feature lets you customize your app's network security settings in a safe, declarative configuration file without modifying app code. The Network Security Configuration feature uses an XML file where you specify the settings for your app. You must include an entry in your app's manifest to point to this file.
  • 7. Secure network communication In the configuration file use ‘cleartextTrafficPermitted’ as false. This means it will not allow the application to use plain http calls. Here we can mention the secure domains that we need in our application.
  • 8. Security on Data storage To save sensitive information of files used in the application or to send sensitive data over the network use Cryptography. Cryptography is the most efficient way to achieve data security. Cryptography techniques include confidentiality, integrity, non-repudiation, and authentication.The many examples of cryptography are DES, AES, RSA, and Diffie-Hellman key exchange.
  • 9. Security on Data storage 01 Symmetric-key (Secret-key) Used to transmit big data. Symmetric Encryption uses a single key for encryption and decryption. Symmetric encryption is fast technique RC4, AES, DES, 3DES, and QUAD. 02 Asymmetric-key (Public-key) Used to transmit small data. Asymmetric Encryption uses two keys for encryption and decryption Asymmetric encryption is slower in terms of speed. RSA, Diffie-Hellman, ECC algorithms.
  • 10. Security on Data storage Storing private data within Internal storage. Use External storage cautiously. Store only non-sensitive data in cache files. Use SharedPreferences in private mode by using MODE_PRIVATE. Use Encrypted Shared Preferences.
  • 11. Secure Webviews If the application does not directly use java script within the WebView then do not call - JavaScriptEnabled(true). Enabling true means any attacker can inject his JavaScript that will give him control.
  • 12. Proguard or R8 Shrink, obfuscate, and optimize your code with the R8 compiler. This make the application code short and using reverse engineering will not provide the actual code.