Removing Secrets to Make Mobile Apps More MASVS-Secure
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Learn how to enhance the security of mobile applications by removing secrets and adhering to MASVS (Mobile Application Security Verification Standard) guidelines in this 48-minute conference talk from Global AppSec Dublin. Explore various attack surfaces and defense mechanisms, including static analysis, obfuscation, Play Integrity, certificate pinning, and channel hardening. Discover a proposed architecture for secure user authentication, first-party API calls, and remote secrets storage. Gain insights into implementing app authentication as a service and achieving MASVS resilience to create more secure mobile applications.
Syllabus
Intro
Danger - Hardcoded API Keys
Mobile Attack Surfaces
Attack: Static Analysis
Defense: Obfuscation
Defense: Play Integrity
Attack: Manipulator in the Middle
Defense: Certificate Pinning
Attack: Bypass Certificate Pinning
Defense: Harden Channel
Hide & Seek Observations
How Do We Authenticate Our Users?
Design Objectives
Proposed Architecture
Making a 1st Party API Call
Changing the Signing Secret
Remote Secrets Storage
Managing Certificate Pinning
Signing a Message
Updating Security Live
MASVS Resilience
App Auth as a Service
Taught by
OWASP Foundation
Related Courses
Secure Software Development: Verification and More Specialized TopicsLinux Foundation via edX Developing Secure Software
LinkedIn Learning Ethical Hacking: Mobile Devices and Platforms
LinkedIn Learning Tüm Aşamalarıyla İnşaat Eğitimi - AUTOCAD/STA4/EXCEL/PROJECT
Udemy Mobile Security: Reverse Engineer Android Apps From Scratch
Udemy