Research Output
The Far Side of Mobile Application Integrated Development Environments
  Smart phones are, nowadays, a necessity for the vast majority of individuals around the globe. In addition to the ubiquitous computing paradigm supported by such devices, there are numerous software applications that utilize the high computational capabilities that they offer. This type of software is a vital part of what is known as e-Commerce, with a variety of business models proposed and implemented. Lately, a new era of free-ware mobile application has arisen with paid features and promoted content in them. Piracy is not only the weakest point of software’s financial ecosystem for conventional computing systems but also for smartphones. Actions like replication, redistribution and licensing violations can cause financial losses of colossal extent to their creators. Mobile applications also introduce the following peculiarity: They are distributed through predefined channels (Application Stores) owned by mobile operating system vendors such as Apple, Google and Microsoft. In this research we present several scenarios where cracked and modified applications can be freely used into every non jailbroken iOS device. Moreover it is demonstrated that not even in strict mobile environments, such as Apple’s, end-users should be considered as trusted entities from application developers by default.

  • Date:

    06 August 2016

  • Publication Status:

    Published

  • Publisher

    Springer International Publishing

  • DOI:

    10.1007/978-3-319-44341-6_8

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

  • Funders:

    Historic Funder (pre-Worktribe)

Citation

Lyvas, C., Pitropakis, N., & Lambrinoudakis, C. (2016). The Far Side of Mobile Application Integrated Development Environments. In S. Katsikas, C. Lambrinoudakis, & S. Furnell (Eds.), Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science, 111-122. https://doi.org/10.1007/978-3-319-44341-6_8

Authors

Keywords

Application integrity, application reverse engineer, application security,

Monthly Views:

Available Documents