Next Article in Journal
Input Efficiency Measurement and Improvement Strategies of New Infrastructure under High-Quality Development
Next Article in Special Issue
Iot-Based Privacy-Preserving Anomaly Detection Model for Smart Agriculture
Previous Article in Journal
Organizational Paradoxes and Metamorphosis in Collective Action
Previous Article in Special Issue
Video Synopsis Algorithms and Framework: A Survey and Comparative Evaluation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity

1
Department of Informatics, University of Zilina, 01026 Zilina, Slovakia
2
Department of Computer Engineering and Information Systems, Khmelnytskyi National University, 29016 Khmelnytskyi, Ukraine
*
Author to whom correspondence should be addressed.
Systems 2023, 11(5), 242; https://doi.org/10.3390/systems11050242
Submission received: 21 April 2023 / Revised: 10 May 2023 / Accepted: 11 May 2023 / Published: 12 May 2023

Abstract

:
Currently, there is a contradiction between the growing number of mobile applications in use and the responsibility that is placed on them, on the one hand, and the imperfection of the methods and tools for ensuring the security of mobile applications, on the other hand. Therefore, ensuring the security of mobile applications by developing effective methods and tools is a challenging task today. This study aims to evaluate the mutual correlations and weights of factors and consequences of mobile application insecurity. We have developed a method of evaluating the weights of factors of mobile application insecurity, which, taking into account the mutual correlations of mobile application insecurity consequences from these factors, determines the weights of the factors and allows us to conclude which factors are necessary to identify and accurately determine (evaluate) to ensure an appropriate level of reliability of forecasting and assess the security of mobile applications. The experimental results of our research are the evaluation of the weights of ten OWASP mobile application insecurity factors the identification of the mutual correlations of the consequences of mobile applications’ insecurity from these factors, and the identification of common factors on which more than one consequence depends.

1. Introduction

Currently, we cannot imagine our daily life without a smartphone and the numerous applications that we use for various purposes. Nowadays, people increasingly rely on mobile applications for all aspects of their lives and use them several times a day. The Apple App Store and Google Play Store offer more than eight million different applications. However, we cannot be sure that the program came from a reputable source and that it is completely safe. Despite Apple’s procedure before apps are released in the App Store and Google’s procedure before apps are released in Google Play, there are still many examples of mobile app vulnerabilities and security risks, and in particular, the data processed by apps and mobile devices are usually targeted by cybercriminals. Mobile operating systems lack effective tools for detecting malware that compromises personal data [1]. Mobile applications can potentially pose serious security risks to their users. Applications may contain vulnerabilities that can be exploited by attackers to gain unauthorized access to device resources, including confidential information on a mobile device [2].
Thus, mobile applications are a critical component of the mobile ecosystem that requires further research to develop the security methods and tools necessary to mitigate the risks associated with mobile applications.
The vulnerabilities of mobile applications (authentication and authorization errors, data leakage, etc.) and their security risks (API vulnerabilities, weak authorization and authentication, client-side injection, a low level of server-side security, insecure data storage, insecure data transmission, data leakage, improper session handling, the use of a broken or insecure encryption algorithm, etc.) are very dangerous because today, users are used to trusting confidential information to their devices, including financial information and medical data, which is a serious cybersecurity challenge for developers and suppliers of mobile applications [3,4], as the data processed by mobile applications and devices are usually targeted by cybercriminals [5]. In addition, as many new mobile applications on the Internet of things (IoT) have emerged recently, the threat posed by wormhole attacks has increased [6]. In general, security is one of the main challenges in mobile IoT networks, which consist of a huge number of objects, leading to an increase in the number of threats in our daily lives [7,8]. Today’s society is so dependent on networks of mobile Internet of things that cyberphysical attacks are considered a key threat to ordinary citizens, endangering both material values and human lives [9,10].
According to statistics [11], 312 cases of Android application vulnerabilities and 87 cases of iOS application vulnerabilities were recorded. In general, the open-source nature of Android makes this operating system and Android applications a prime target for malware [12,13,14]. The Android intercomponent communication (ICC) mechanism can cause security issues such as application security policy violations, especially in the case of interapp communication (IAC) [3]. Currently, there is still a need for methods to select attributes for use in Android malware detection systems [15,16].
According to NowSecure’s benchmark testing [17], 85% of the applications studied had one or more security risks. More than 50% of the investigated applications had bottlenecks that led to data protection problems during transmission. About one-third of the tested applications had problems with the source code. In particular, Android apps had code problems that could lead to reverse engineering and other threats.
According to [17,18], when it comes to mobile App security, the main problems that occur the most frequently are improper platform usage, insecure data storage, insecure client–server communication, insecure authentication (for example, the password authentication of users imposes a number of restrictions and is no longer considered safe and convenient for mobile users, while biometric authentication of users has recently attracted increasing attention as a promising solution for improving mobile security [19,20]), insecure authorization, insufficient data encryption, poor code quality, code tampering, reverse engineering risk, and extraneous functionality. The frequency of these precedents impact on the security of mobile applications is shown in Figure 1 (on the basis of the OWASP Mobile Top 10 Risks from 2018 [17,18], because the new Mobile Top 10 Risks list for 2023 is being worked upon, as indicated on the official OWASP website). Next, in this paper, only these ten most prominent factors (OWASP Mobile Top 10 Risks) that affect mobile application security are analyzed.
Figure 1 shows that insecure data storage and insecure client–server communication are the factors that most affect the security of mobile applications. However, the influence of other factors should not be underestimated too.
Thus, the development of modern mobile application development technologies requires the dynamic development of methods and tools to ensure the security of mobile applications. For example, a timely forecasting of mobile application security can be used to take any preventive measures to reduce the number of application vulnerabilities, security risks, etc. Currently, there is a contradiction between the growing number of mobile applications in use and the responsibility that is placed on them, on the one hand, and the imperfection of the methods and tools for ensuring the security of mobile applications, on the other hand. Therefore, ensuring the security of mobile applications by developing effective methods and tools is a challenging task today. Our study is actually devoted to evaluating the weights of factors and identifying the mutual correlations of mobile application insecurity consequences, when developing effective methods and tools for assessing and forecasting the security of mobile applications.
The remaining portion of the paper is structured as follows: The Section 2 provides a comprehensive state of the art of the related works being carried out. The Section 3 details the proposed methodology. The Section 4 details the implementation of the proposed method and a discussion about the application of the obtained results. The final section concludes the paper and describes future enhancements.

2. State of the Art

In the course of the study, an analysis of the influence of the factors indicated in Figure 1 was carried out on examples from real cases of mobile applications used by millions of users, and the consequences that the influence of the above-mentioned factors led to. The results of the analysis are shown in Table 1.
In addition to the mobile application security cases listed in Table 1, a number of other studies have been conducted on the issue of apps’ insecurity.
For example, Encalada et al. [30] analyzed the problem of mobile apps’ information security and privacy issues from a theoretical and empirical perspective. The theoretical analysis showed a poor knowledge of users about the security of the shared information and a growing concern about the given misuse. The empirical results revealed high levels of insecurity in users about mobile applications being given access to their information.
Phasinam and Kassanuk [31] established a taxonomy based on the application domain and the architectural design to better detect IoT security problems. Using network host scanning and vulnerability scanning technologies, raw data on IoT apps were obtained. However, this paper only provided an in-depth study of apps’ attacks and vulnerabilities related to the agriculture field.
Amelang [32] raised the issues of privacy and data security of a mobile application, which presented a digitized, “smart” version of a menstruation calendar. In particular, this study addressed two forms of insecurity—the unanticipated collection of user data by private companies and the potential surveillance. However, these forms of app insecurity mainly related to the gynecology field, although it reflected a general trend of concern about data security in mobile applications.
Chakraborty et al. [33] aimed to find determinants of data-privacy anxiety among Indians and to understand their anxiety during the use of digital applications in their daily routines. Emerging themes from the data indicated the systemic determinants of data-security anxiety.
Aljumah, Altuwijri et al. [34] noted that determining the security of mobile applications was a difficult task and especially paid attention to trying to spot insecure apps, by analyzing user feedback on the Google Play platform and using sentiment analysis to determine the apps’ level of security.
The research in [35] tried to delve deep into the innards of Android to come up with some plausible solutions to somewhat assuage the damage that three intentional leaks of the operating system could create. The paper proposed the ASBP framework (App Sanitization and Better Permissions), which would help remove the identified vulnerabilities that afflict Android, namely third-party apps and vendor-customized ones.
Sanni, Akinyemo et al. [36] is devoted to the development of a predictive model to detect and prevent suspicious customers with cyberthreat potential during the onboarding process for Mobile Money Services in developing nations using a machine learning (ML) technique with the purpose of minimizing the risks of cybercrime.
The goal of Weichbroth et al. [37] was the identification and analysis of the existing threats and best practices in the domain of mobile security. The study results contributed to the theory on mobile security through the identification and exploration of a variety of issues, regarding both threats and best practices.
Therefore, it can be concluded from Table 1 and other considered research that it is relevant and important to study the mutual correlation of risk factors and the consequences they entail for the development of methods and tools for ensuring and predicting the security of mobile applications. Thus, the purpose of our research was the evaluation of the mutual correlations and weights of the factors and consequences of mobile application insecurity.

3. Proposed Methodology

3.1. Modelling the Subject Area of Mobile Application Security Assessment and Forecasting

According to Figure 1, there are ten most prominent factors that affect mobile application security.
We analyzed the cases and examples presented in Table 1 and detected that the factors shown in Figure 1 led to consequences that are summarized in the following.
The consequences of mobile application security insufficiency are:
  • Excessive memory usage;
  • Reputation damage;
  • Material loss;
  • Program unpredictable crashes;
  • Fraud;
  • Identity theft;
  • Information leaks;
  • Slow loading of UX graphic elements;
  • Privacy violation;
  • Code theft;
  • Unauthorized access to data;
  • Intellectual property theft;
  • Information theft;
  • External policy violation;
  • Error occurrence.
The development of effective methods and tools for ensuring the security of mobile applications requires effective methods and tools for assessing and forecasting the security of mobile applications. To effectively assess and forecast the security of mobile applications, it is necessary to forecast the consequences—for example, a probabilistic assessment of their occurrence based on assessments of existing factors. The existence of relationships (correlations) between factors and consequences of mobile application insecurity affects the significance and weight of these factors. It is possible to emphasize the greater use and therefore the greater significance of the correctness of the assessment of some factor by taking into account their weights when assessing and forecasting the security of mobile applications.
According to information from [18,21,22,23,24,25,26,27,28,29], let us represent the dependencies of the mobile application insecurity consequences on the factors. Formulas (1)–(15) give the dependencies of the mobile application insecurity consequences “reputation damage” (rd), “material loss” (ml), “identity theft” (it), “fraud” (fr), “information theft” (itt), “error occurrence” (eo), “excessive memory usage” (emu), “information leaks” (il), “privacy violation” (pv), “code theft” (ct), “intellectual property theft” (ipt), “external policy violation” (epv), “unauthorized access to data” (uad), “program unpredictable crashes” (puc), and “slow loading of UX graphic elements” (slux) from the factors “improper platform usage” (ipu), “insecure data storage” (ids), “insecure client–server communication” (icsc), “insecure authentication risk” (iar), “insecure authorization risk” (iazr), “extraneous functionality risk” (efr), ”code forgery risk” (cfr), “poor code quality” (pcq), “insufficient data encryption” (ide), and “reverse engineering risk” (rer):
rd = f1(ids, icsc, iar, iazr, cfr, pcq, ide, rer) =
= φ1(w2∙ids, w3∙icsc, w4∙iar, w5∙iazr, w7∙cfr, w8∙pcq, w9∙ide, w10∙rer),
where wi (i = 1…10) indicate the weights of 10 mobile application insecurity factors, and fj, φj (j = 1…15) represent the functions of dependencies;
ml = f2(ipu, ids, cfr, rer) = φ2(w1∙ipu, w2∙ids, w7∙cfr, w10∙rer),
it = f3(ipu, ids) = φ3(w1∙ipu, w2∙ids),
fr = f4(ipu, ids, iazr) = φ4(w1∙ipu, w2∙ids, w5∙iazr),
itt = f5(icsc, iar, iazr, cfr, ide) = φ5(w3∙icsc, w4∙iar, w5∙iazr, w7∙cfr, w9∙ide),
eo = f6(cfr, pcq) = φ6(w7∙cfr, w8∙pcq),
emu = f7(pcq) = φ7(w8∙pcq),
il = f8(ide, rer) = φ8(w9∙ide, w10∙rer),
pv = f9(ipu, efr, ide) = φ9(w1∙ipu, w6∙efr, w9∙ide),
ct = f10(cfr, ide) = φ10(w7∙cfr, w9∙ide),
ipt = f11(efr, ide, rer) = φ11(w6∙efr, w9∙ide, w10∙rer),
epv = f12(ids, efr, rer) = φ12(w2∙ids, w6∙efr, w10∙rer),
uad = f13(icsc, efr, cfr, rer) = φ13(w3∙icsc, w6∙efr, w7∙cfr, w10∙rer),
puc = f14(iar, cfr, pcq) = φ14(w4∙iar, w7∙cfr, w8∙pcq),
slux = f15(pcq) = φ15(w8∙pcq).
Therefore, the set of mobile application insecurity factors (MAIF) has the form:
MAIF = {maif1, …, maif10} = {ipu, ids, icsc, iar, iazr, efr, cfr, pcq, ide, rer}.
The set of weighted factors of mobile application insecurity (MAIFW) has the form:
MAIFW = {maifw1, …, maifw10} = { w1∙ipu, w2∙ids, w3∙icsc, w4∙iar, w5∙iazr, w6∙efr, w7∙cfr, w8∙pcq, w9∙ide, w10∙rer}.
In addition, the set of mobile application insecurity consequences (MAIC) has the form:
MAIC = {maic1, …, maic15} =
={rd, ml, fr, it, itt, eo, emu, il, pv, ct, ipt, epv, uad, puc, slux}.
Therefore, it is necessary to have the values of the weights of the mobile application insecurity factors. Since the mobile application insecurity consequences are correlated by factors, the existence of such a correlation should be taken into account when calculating the factors’ weights.
Since it is necessary to systematize and bring to a single unified form the available information on the mobile application insecurity factors and consequences, as well as to reflect the cause-and-effect relationships between them, let us present a model of the subject area of mobile application security assessment and forecasting in the form of an ontology, taking into account the principles of ontological modelling defined in [38,39].
Formally, an ontology is defined as: O = <X, RX, F>, where X is a finite set of concepts of the subject area, RX is a finite set of relations between concepts, F is a finite set of interpretation functions defined on concepts or relations [38,39].
Then, the model of the subject area of mobile application security assessment and forecasting is as follows: OMAS = <XMAS, RXMAS, FMAS>, where XMAS is a finite set of mobile application insecurity factors and consequences, RXMAS is a finite set of relations between the mobile application insecurity factors and consequences, FMAS is a finite set of interpretation functions defined for the mobile application insecurity factors and consequences. Taking into account the sets (16) and (18), the set of mobile application insecurity factors and consequences has the form:
XMAS = {MAIF, MAIC} = {xmas1, …, xmas25},
where {xmas1, …, xmas10} included in MAIF, i.e., {xmas1, …, xmas10} = {maif1, …, maif10}; {xmas11, …, xmas25} included in MAIC, i.e., {xmas11, …, xmas25} = {maic1, …, maic15}.
The set RXMAS of relations between the concepts consists of the “depend on” relation, i.e., RXMAS = {“depend on”}.
The set FMAS of interpretation functions, defined for the mobile application insecurity factors and consequences, consists of the functions of the dependencies of the mobile application insecurity consequences on the factors, i.e., FMAS = {f1, …, f15}.
Then, the ontological model of the subject area of mobile application security assessment and forecasting is as follows:
OMAS = <{xmas1, …, xmas25}, {“depend on”}, {f1, …, f15}>.
Since it is necessary to take into account the weights of mobile application insecurity factors when assessing and forecasting the security of mobile applications, we need to introduce such weights into the ontological model of the subject area of assessing and forecasting the security of mobile applications and to develop a weighted ontology.
Considering the sets (17) and (18), the set of mobile application insecurity factors and consequences for the weighted ontology has the form:
XMASW = {MAIFW, MAIC} = {xmas1, …, xmas25},
where {xmasw1, …, xmasw10} included in MAIFW, i.e., {xmasw1, …, xmasw10} = {maifw1, …, maifw10}; {xmasw11, …, xmasw25} included in MAIC, i.e., {xmasw11, …, xmasw25} = { maic1, …, maic15}.
The set RXMASW of relations between concepts also consists only of the “depends on” relation, i.e., RXMASW = {“depend on”}.
The set FMASW of interpretation functions, defined for the mobile application security factors and consequences, consists of the functions of the dependencies of the mobile application insecurity consequences on the weighted factors, i.e., FMASW = {φ1, …, φ15}.
Then, the weighted ontological model of the subject area of mobile application security assessment and forecasting is as follows:
OMASW = <{xmasw1, …, xmasw25}, {“depend on”}, {φ1, …, φ15}>.
The developed models of dependencies of mobile application insecurity consequences on the factors (Equations (1)–(15)), as well as the ontological (Equation (20)) and weighted ontological (Equation (22)) models of the subject area, solve the problem of systematizing all the available information on assessing and forecasting the security of mobile applications and bringing it to a single unified form and are necessary to reflect the causal relationships between mobile application insecurity factors and consequences.

3.2. Method of Evaluating the Weights of Factors of Mobile Application Insecurity

It is obvious that to develop a weighted ontology of the subject area of mobile application security assessment and forecasting, whose model is represented by Equation (22), it is necessary to have the weights of the factors of mobile application insecurity. Let us develop the method of evaluating the weights of the factors of mobile application insecurity, based on the concept of evaluating the weights of software quality measures and indicators presented by one of the co-authors in [40].
The method of evaluating the weights of factors of mobile application insecurity consists of the following steps:
  • Identifying the common factors for the mobile application insecurity consequences:
    1.1.
    Formation of a matrix of common factors for the mobile application insecurity consequences MAICJ = (maicjk,l)15×15 = ∩k=115l=115(MAICMk, MAICMl), where maicjk,l = {MAICMk ∩ MAICMl} is the k,l-th element of the matrix, which is the set of attributes, which are common to the k-th and l-th mobile application insecurity consequences; MAICMk and MAICMl are, respectively, the k-th and l-th mobile application insecurity consequences, represented by the sets of their factors according to the models represented by Equations (1)–(15), but the diagonal elements of the matrix are empty sets, i.e., maicjk,k = Ø;
    1.2.
    Formation of a matrix of the number of common factors for the mobile application insecurity consequences MAICJN = (maicjnk,l)15×15, where maicjnk,l = |maicjk,l| = |{MAICMk ∩ MAICMl}| is the k,l-th element of the matrix, which is equal to the number of elements of the corresponding set maicjk,l, i.e., the number of common factors of the k-th and l-th mobile application insecurity consequences;
    1.3.
    Formation of the set of common factors JF = {jf1, …, jfm} (where m is the number of relevant common factors) for the mobile application insecurity consequences based on the elements of the matrix MAICJ as a symmetric difference (disjunctive sum) of all set elements maicjk,l, for which the condition k < l is met (i.e., elements above the main diagonal): JF = {maicj1,2 maicj1,3 maicjk,l maicj14,15};
    1.4.
    Formation of the matrix of dependence of the mobile application insecurity consequences from common factors F = (fk,l)m×15, where the k,l-th element of the matrix fk,l = 1, if jfk € MAICMl, i.e., if the k-th common factor is included in the set of factors of the l-th consequence.
  • Calculation of the weights of the mobile application insecurity factors based on the number of mobile application insecurity consequences that depend on these factors:
    2.1.
    Counting the number of consequences kch, which depend on the h-th common factor: kch = kch + 1, if fh,l = 1 (l = 1…15), counting the number of “1s” in each row of the matrix F;
    2.2.
    Calculation of the weight of the h-th factor by the formula: wh = kch/kf, where kf is the total number of factors (as shown above, now the mobile application insecurity consequences depend on 10 different factors, i.e., currently, kf = 10); the numerator of the weights of each factor indicates the number of mobile application insecurity consequences that depend on this factor, because if several factors leading to the same consequence are present but not identified or are not accurately determined, the validity of the obtained estimate of such a consequence of mobile application insecurity is significantly reduced, or the possibility of obtaining such an estimate disappears altogether.
A developed method of evaluating the weights of the factors of mobile application insecurity determined the weights of the factors and provides the conclusion about factors, which are necessary to identify and accurately evaluate to ensure an appropriate level of reliability when forecasting and assessing the security of mobile applications.

4. Results and Discussion

4.1. Results: Evaluating the Weights of Factors of Mobile Application Insecurity

Using the developed method of evaluating the weights of the factors of mobile application insecurity, let us evaluate the weights of ten known factors of mobile application insecurity.
In step 1, we identified the common factors for the mobile application insecurity consequences. We created a MAICJ matrix of common factors for the mobile application insecurity consequences (on the basis of Formulas (1)–(15)).
Next, we formed the matrix MAICJN of the number of common factors for the mobile application insecurity consequences—Table 2.
Let us form the set JF of common factors for the mobile application insecurity consequences; each of the factors was used more than once, so JF = MAIF = {ipu, ids, icsc, iar, iazr, efr, cfr, pcq, ide, rer).
Next, we formed the matrix F of the dependence of the mobile application insecurity consequences on common factors—Table 3.
In step 2, we calculated the weights of the mobile application insecurity factors based on the number of mobile application insecurity consequences that depended on these factors. Let us start by counting the number of consequences that depend on each common factor: kc1 = 4 for factor ipu; kc2 = 5 for factor ids; kc3 = 3 for factor icsc; kc4 = 3 for factor iar; kc5 = 3 for factor iazr; kc6 = 4 for factor efr; kc7 = 7 for factor cfr; kc8 = 5 for factor pcq; kc9 = 6 for factor ide; kc10 = 6 for factor rer.
Then, we calculated the weight of each factor:
w1 = kc1/kf = 4/10 = 0.4 for factor ipu;
w2 = kc2/kf = 5/10 = 0.5 for factor ids;
w3 = kc3/kf = 3/10 = 0.3 for factor icsc;
w4 = kc4/kf = 3/10 = 0.3 for factor iar;
w5 = kc5/kf = 3/10 = 0.3 for factor iazr;
w6 = kc6/kf = 4/10 = 0.4 for factor efr;
w7 = kc7/kf = 7/10 = 0.7 for factor cfr;
w8 = kc8/kf = 5/10 = 0.5 for factor pcq;
w9 = kc9/kf = 6/10 = 0.6 for factor ide;
w10 = kc10/kf = 6/10 = 0.6 for factor rer.
The numerator of the weights of each factor indicated the number of mobile application insecurity consequences that depended on that factor.
Taking into account the determined weights of each factor, the set of weighted factors of the mobile applications insecurity (Equation (17)) had the following form:
MAIFW = {maifw1, …, maifw10} = {0.4∙ipu, 0.5∙ids, 0.3∙icsc, 0.3∙iar, 0.3∙iazr, 0.4∙efr, 0.7∙cfr, 0.5∙pcq, 0.6∙ide, 0.6∙rer).
In this paper, the weights of the factors of mobile application insecurity were evaluated, taking into account the correlations of the mobile applications insecurity consequences with the factors, and the weights for ten known factors were determined. However, such an assessment of the weights of the factors of mobile application insecurity is easily scalable and adaptable to changes in the number and list of factors and consequences of mobile application insecurity.

4.2. Results: Identifying the Mutual Correlations of Mobile Application Insecurity Factors and Consequences

Considering that one factor can cause several of the consequences obtained in Section 4.1’s results, we decided to conduct an analysis to find out which factors caused the same consequences and which factors caused the most consequences in order to identify the most potentially dangerous factors. The diagram of consequences of mobile application insecurity dependency on the factors that affected mobile application security is presented in Figure 2. From Figure 2 we can see that all factors can cause three or more consequences. Thus, improper platform usage caused four consequences. Insecure data storage caused five consequences. Insecure client–server communication caused three consequences. Insecure authentication risk caused three consequences. Insecure authorization risk caused three consequences. Extraneous functionality risk caused four consequences. Code forgery risk caused seven consequences. Poor code quality caused five consequences. Insufficient data encryption and reverse engineering risk caused six consequences each. Therefore, we can identify that three factors that cause the most consequences can be considered as the most potentially dangerous for mobile application security—code forgery risk, insufficient data encryption, and reverse engineering risk.
To see the correlation between the factors and the consequences that they cause, we created a diagram of the correlations between factors and consequences, which is presented in Figure 3. The diagram of the correlations between factors and consequences shows two types of relationships between the mobile application insecurity factors and consequences—the “cause” relationship, which reflects which factors cause which consequences, and the “depend on” relationship, which reflects which consequences depend on which factors.
From the correlation diagram, we can see that not only one factor can cause several consequences, but also that one consequence can depend on more than one factor. Let us analyze the diagram in Figure 3 and determine which consequences depend on more than one factor.
Thus, material loss is caused by four factors. Fraud is caused by three factors. Reputation damage is caused by eight factors. Identity theft is caused by two factors. Information theft is caused by five factors. Error occurrence is caused by two factors. Excessive memory usage is caused by one factor. Information leaks are caused by two factors. Privacy violation is caused by three factors. Code theft is caused by two factors. Intellectual property theft is caused by three factors. External policy violation is caused by two factors. Unauthorized access to data is caused by five factors. Program unpredictable crashes are caused by one factor and a slow loading of UX graphic elements is also caused by one factor.
Special attention should be paid to consequences affected by more than one threat factor. They are the ones that pose the greatest danger to users, for example, unauthorized access to data, which can be caused by four threat factors (Figure 4a). This is dangerous both for users, as their personal data may end up in the hands of attackers, and for the company, with the risk of lawsuits from users and, as a result, significant financial losses. The risk of reputation damage can be caused by eight threat factors (Figure 4b). This is dangerous for the company’s founder and the developer of the mobile application, as this consequence is irreversible. The company loses not only the trust of users but also incurs significant financial losses.
Thus, this subsection identified the mutual correlations of mobile application insecurity consequences with factors, identified common factors on which more than one consequence depended in order to increase the accuracy of their values when assessing and forecasting the mobile application security.

4.3. Discussion

As it was proved above, when developing effective methods and tools for assessing and forecasting the security of mobile applications, there is a constant need to forecast the consequences to assess, for example, the probability of their occurrence based on assessments of existing factors. The existence of relationships (correlations) between the mobile application insecurity consequences and the factors affects the significance and weights of the factors.
If one or several factors that lead to the same consequence are present but not identified or are not accurately determined, the validity of the obtained estimate of such a consequence of mobile application insecurity is significantly reduced or the possibility of obtaining such an estimate disappears altogether. Therefore, it is important to mitigate the impact of the mutual correlations of such mobile application insecurity consequences with factors, through ensuring and increasing the accuracy of their values; for this, namely, the identification of common factors, counting the number of mobile application insecurity consequences that depend on these factors is necessary. The conducted study was devoted to identifying the mutual correlations and evaluating the weights of the factors and consequences of mobile application insecurity.
Since there is a need to systematize and unify the available information on mobile application insecurity factors and consequences, as well as to reflect the cause-and-effect relationships between them (for example, the relationship (correlation) between the consequences of mobile application insecurity and the factors), it was decided to use the apparatus of ontologies and weighted ontologies, which allowed us to specify the information on mobile application insecurity factors and consequences necessary to describe and solve the problems of this subject area. In this paper, the ontologies and weighted ontologies provided a theoretical basis for the development of methods and tools for assessing, forecasting, and ensuring the security of mobile applications.
The advantage of using ontologies and weighted ontologies for organizing the information about mobile application insecurity factors and consequences is the possibility of an automatic processing of this information by ontology-based intelligent agents, as well as automatically assessing and forecasting the mobile application’s security based on the received information.

5. Conclusions

Currently, there is a contradiction between the growing number of mobile applications in use and the responsibility that is placed on them, on the one hand, and the imperfection of the methods and tools for ensuring the security of mobile applications, on the other hand. Thus, ensuring the security of mobile applications by developing effective methods and tools is a challenging task today. The purpose of this research was to evaluate the mutual correlations and weights of the factors and consequences of mobile application insecurity.
We developed models of dependencies of mobile application insecurity consequences on the factors, as well as ontological and weighted ontological models of the subject area, which solved the problem of systematizing all the available information for assessing and forecasting the security of mobile applications and bringing it to a single unified form and were necessary to reflect the causal relationships between mobile application insecurity factors and consequences.
A method of evaluating the weights of factors of mobile application insecurity was developed, which, taking into account the mutual correlations of mobile application insecurity consequences with the factors, determined the weights of the factors and allowed us to conclude which factors were necessary to identify and accurately determine (evaluate) to ensure an appropriate level of reliability for forecasting and assessing the security of mobile applications. The developed method for evaluating the weights of the factors of mobile application insecurity is easily scalable and adaptable to changes in the number and list of factors and consequences of mobile application insecurity.
The paper evaluated the weights of factors of mobile application insecurity and determined the weights for ten factors known to date. The paper identified the mutual correlations of the consequences of mobile application insecurity with these factors, identified the common factors on which more than one consequence depended in order to increase the accuracy of their values when assessing and predicting the security of mobile applications.
The representativeness of a research study and its results is achieved through a proper design of the study, which should reproduce the general object of research in terms of the parameters essential to the study. In our case, the object of research was the OWASP mobile application insecurity factors and mobile application insecurity consequences that depend on these factors. The study was devoted to evaluating and weighting these selected ten factors and the mutual correlations of the consequences of mobile application insecurity with these factors. The experimental results of our research are the evaluation of the weights of ten OWASP mobile application insecurity factors, the identification of the mutual correlations of the consequences of mobile application insecurity with these factors, and the identification of common factors on which more than one consequence depends. Thus, this study, as well as its results, is representative, as it correctly reproduces the general object of our study.
The areas for future research by the authors are:
  • The implementation of the ontology and weighted ontology of the subject area of assessing and forecasting the security of mobile applications, represented by Equations (20) and (22), respectively, using, for example, the Protégé platform;
  • Establishing the dependencies of the mobile application insecurity consequences on the factors—the form of functions f1–f15, φ1–φ15, which are currently unknown;
  • The design and implementation of ontology-based intelligent agents that will provide the ability to automatically process information on the subject area of assessing and forecasting the security of mobile applications, as well as the ability to automatically assess and forecast the security of mobile applications based on the received information;
  • The design and development of methods and tools for forecasting, assessing, and ensuring the security of mobile applications;
  • The research of other (in addition to OWASP) factors that affect mobile application security, the search for their mutual correlations, the calculation of their weights, and adding them to the developed ontologies.

Author Contributions

Conceptualization, E.Z. and T.H.; methodology: O.P. and Y.V.; state of the art, T.H. and O.P.; results, O.P. and Y.V.; discussion, E.Z. and T.H.; writing—original draft preparation, T.H. and O.P.; writing—review and editing, E.Z.; visualization, O.P.; supervision, E.Z.; project administration, T.H.; funding acquisition, T.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The dataset used for the findings is included in the manuscript.

Acknowledgments

The investigation in this paper was partly implemented under the project “New methods development for reliability analysis of complex system” (APVV-18-0027).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, C.; Lu, J.; Feng, W.; Du, E.; Di, L.; Song, Z. MOBIPCR: Efficient, accurate, and strict ML-based mobile malware detection. Future Gener. Comput. Syst. 2023, 144, 140–150. [Google Scholar] [CrossRef]
  2. Tsai, C.-Y.; Shih, W.-L.; Hsieh, F.-P.; Chen, Y.-A.; Lin, C.-L.; Wu, H.-J. Using the ARCS model to improve undergraduates’ perceived information security protection motivation and behavior. Comput. Educ. 2022, 181, 104449. [Google Scholar] [CrossRef]
  3. Nirumand, A.; Zamani, B.; Tork-Ladani, B.; Klein, J.; Bissyandé, T.F. A model-based framework for inter-app Vulnerability analysis of Android applications. Softw.-Pract. Exp. 2023, 53, 895–936. [Google Scholar] [CrossRef]
  4. He, S.; Ficke, E.; Ahsan Pritom, M.M.; Chen, H.; Tang, Q.; Chen, Q.; Pendleton, M.; Njilla, L.; Xu, S. Blockchain-based automated and robust cyber security management. J. Parallel Distrib. Comput. 2022, 163, 62–82. [Google Scholar] [CrossRef]
  5. Zhu, P.; Hu, J.; Li, X.; Zhu, Q. Using Blockchain Technology to Enhance the Traceability of Original Achievements. IEEE Trans. Eng. Manag. 2023, 70, 1693–1707. [Google Scholar] [CrossRef]
  6. Kuo, S.-Y.; Tseng, F.-H.; Chou, Y.-H. Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism. Future Gener. Comput. Syst. 2023, 143, 179–190. [Google Scholar] [CrossRef]
  7. Nayak, P.; Swapna, G. Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview. Internet Things 2023, 21, 100641. [Google Scholar] [CrossRef]
  8. Thien, H.T.; Tuan, P.-V.; Koo, I. A Secure-Transmission Maximization Scheme for SWIPT Systems Assisted by an Intelligent Reflecting Surface and Deep Learning. IEEE Access 2022, 10, 31851–31867. [Google Scholar] [CrossRef]
  9. Kovtun, V.; Izonin, I.; Gregus, M. Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks. Sci. Rep. 2022, 12, 12849. [Google Scholar] [CrossRef]
  10. Shandilya, S.K.; Ganguli, C.; Izonin, I.; Nagar, A.K. Cyber attack evaluation dataset for deep packet inspection and analysis. Data Brief 2023, 46, 108771. [Google Scholar] [CrossRef]
  11. CVEdetails.com: The Ultimate Security Vulnerability Data Source. Available online: https://www.cvedetails.com/ (accessed on 12 April 2023).
  12. Zhu, H.; Wei, H.; Wang, L.; Xu, Z.; Sheng, V.S. An effective end-to-end android malware detection method. Expert Syst. Appl. 2023, 218, 119593. [Google Scholar] [CrossRef]
  13. Keyvanpour, M.R.; Barani Shirzad, M.; Heydarian, F. Android malware detection applying feature selection techniques and machine learning. Multimed. Tools Appl. 2023, 82, 9517–9531. [Google Scholar] [CrossRef]
  14. Saraswat, P. An inclusive analysis of Google’s android operating system and its security. AIP Conf. Proc. 2023, 2427, 020097. [Google Scholar] [CrossRef]
  15. Guerra-Manzanares, A.; Bahsi, H.; Luckner, M. Leveraging the first line of defense: A study on the evolution and usage of android security permissions for enhanced android malware detection. J. Comput. Virol. Hacking Tech. 2023, 19, 65–96. [Google Scholar] [CrossRef]
  16. Şahin, D.Ö.; Kural, O.E.; Akleylek, S.; Kılıç, E. A novel permission-based Android malware detection system using feature selection based on linear regression. Neural Comput. Appl. 2023, 35, 4903–4918. [Google Scholar] [CrossRef]
  17. A Decade in, How Safe Are Your iOS and Android Apps? Available online: https://www.nowsecure.com/blog/2018/07/11/a-decade-in-how-safe-are-your-ios-and-android-apps/ (accessed on 12 April 2023).
  18. Understanding OWASP Mobile Top 10 Risks with Real-World Cases. Available online: https://appinventiv.com/blog/owasp-mobile-top-10-real-world-cases/ (accessed on 12 April 2023).
  19. Papaioannou, M.; Pelekoudas-Oikonomou, F.; Mantas, G.; Serrelis, E.; Rodriguez, J.; Fengou, M.-A. A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones. Sensors 2023, 23, 2979. [Google Scholar] [CrossRef]
  20. Byun, J.W. Towards serverless fast one round authentication with two mobile end devices. J. Supercomput. 2023, 79, 5684–5704. [Google Scholar] [CrossRef]
  21. Kaspersky Researchers Uncover Flaws in Popular Dating Apps Like Tinder, OkCupid, and Bumble. Available online: https://fortune.com/2017/10/25/tinder-kaspersky-okcupid-bumble-dating-app-security-hack/ (accessed on 12 April 2023).
  22. Watch Out for a Clever Touch ID Scam Hitting the App Store. Available online: https://www.wired.com/story/iphone-touch-id-scam-apps/ (accessed on 12 April 2023).
  23. IoT Vuln Disclosure: Children’s GPS Smart Watches (R7-2019-57). Available online: https://www.rapid7.com/blog/post/2019/12/11/iot-vuln-disclosure-childrens-gps-smart-watches-r7-2019-57/ (accessed on 12 April 2023).
  24. Weak Encryption Leaves Mobile Health App at Risk for Hacking. Available online: https://www.careersinfosecurity.com/weak-encryption-leaves-mobile-health-app-at-risk-for-hacking-a-11833 (accessed on 12 April 2023).
  25. Hacking Smart Car Alarm Systems. Available online: https://www.kaspersky.com/blog/hacking-smart-car-alarm-systems/26014/ (accessed on 12 April 2023).
  26. Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware on Phones. Available online: https://thehackernews.com/2019/05/hack-whatsapp-vulnerability.html (accessed on 12 April 2023).
  27. Prabakaran, M.K.; Sundaram, P.M.; Chandrasekar, A.D. An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. IET Inf. Secur. 2023, 1–18. [Google Scholar] [CrossRef]
  28. How Pokémon Go Fans Hacked ‘Em All: And How to Prevent Similar Reverse-Engineering. Available online: https://nordicapis.com/how-pokemon-go-fans-hacked-em-all-and-how-to-prevent-similar-reverse-engineering/ (accessed on 12 April 2023).
  29. An Obscure App Flaw Creates Backdoors in Millions of Smartphones. Available online: https://www.wired.com/2017/04/obscure-app-flaw-creates-backdoors-millions-smartphones/ (accessed on 12 April 2023).
  30. Encalada, D.; Soto-Alvarado, M.; Chamba-Gonzalez, V. Perception of information security in mobile applications. In Proceedings of the 2022 Iberian Conference on Information Systems and Technologies, Madrid, Spain, 22–25 June 2022. [Google Scholar] [CrossRef]
  31. Phasinam, K.; Kassanuk, T. Evaluation of vulnerabilities in IoT-based intelligent agriculture systems. Auton. Veh. Smart Veh. Commun. 2022, 2, 237–258. [Google Scholar]
  32. Amelang, K. (Not) Safe to Use: Insecurities in Everyday Data Practices with Period-Tracking Apps. In Transforming Communication; Springer: Berlin/Heidelberg, Germany, 2022; pp. 297–321. [Google Scholar] [CrossRef]
  33. Chakraborty, R.; Prakasha, G.S.; Sripavithra, C.K. Factors Affecting Data-Privacy Protection and Promotion of Safe Digital Usage. CEUR-WS 2021, 3094, 49–58. [Google Scholar]
  34. Aljumah, A.; Altuwijri, A.; Alsuhaibani, T.; Selmi, A.; Alruhaily, N. Android Apps Security Assessment using Sentiment Analysis Techniques: Comparative Study. Int. J. Interact. Mob. Technol. 2021, 15, 123–133. [Google Scholar] [CrossRef]
  35. Bhardwaj, A.; Singh, A.J. Implementing ASBP: A novel framework for sanitizing android apps. Int. J. Eng. Adv. Technol. 2019, 8, 5366–5374. [Google Scholar] [CrossRef]
  36. Sanni, M.L.; Akinyemi, B.O.; Olalere, D.A.; Olajubu, E.A.; Aderounmu, G.A. A Predictive Cyber Threat Model for Mobile Money Services. Ann. Emerg. Technol. Comput. 2023, 7, 40–60. [Google Scholar] [CrossRef]
  37. Weichbroth, P.; Łysik, Ł. Mobile Security: Threats and Best Practices. Mob. Inf. Syst. 2020, 2020, 8828078. [Google Scholar] [CrossRef]
  38. Hovorushchenko, T. Methodology of Evaluating the Sufficiency of Information for Software Quality Assessment According to ISO 25010. J. Inf. Organ. Sci. 2018, 42, 63–85. [Google Scholar] [CrossRef]
  39. Hovorushchenko, T.; Pomorova, O. Methodology of Evaluating the Sufficiency of Information on Quality in the Software Requirements Specifications. In Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies, Kyiv, Ukraine, 24–27 May 2018. [Google Scholar] [CrossRef]
  40. Hovorushchenko, T.; Pomorova, O. Evaluation of Mutual Influences of Software Quality Characteristics Based ISO 25010:2011. In Proceedings of the 2016 IEEE 11th International Conference on Computer Sciences and Information Technologies, Lviv, Ukraine, 6–10 September 2016. [Google Scholar] [CrossRef]
Figure 1. The Frequency of Threat Factors Influences on the Security of Mobile Applications [17,18].
Figure 1. The Frequency of Threat Factors Influences on the Security of Mobile Applications [17,18].
Systems 11 00242 g001
Figure 2. Diagram of Consequences of Mobile Application Insecurity Dependency on Factors That Affect Mobile Application Security.
Figure 2. Diagram of Consequences of Mobile Application Insecurity Dependency on Factors That Affect Mobile Application Security.
Systems 11 00242 g002
Figure 3. Diagram of the Correlations Between Factors and Consequences.
Figure 3. Diagram of the Correlations Between Factors and Consequences.
Systems 11 00242 g003
Figure 4. Consequences Caused by the Largest Number of Threat Factors: (a) Unauthorized Access to Data is Caused by 4 Threat Factors; (b) Reputation Damage is Caused by 8 Threat Factors.
Figure 4. Consequences Caused by the Largest Number of Threat Factors: (a) Unauthorized Access to Data is Caused by 4 Threat Factors; (b) Reputation Damage is Caused by 8 Threat Factors.
Systems 11 00242 g004
Table 1. Impact of Threat Factors on Mobile Application Security on Examples from Real Cases.
Table 1. Impact of Threat Factors on Mobile Application Security on Examples from Real Cases.
Company or Application NameCause or Factor of the ThreatConsequences
Tinder, OkCupid, Bumble dating applications [21]Insecure data storagePopular dating apps such as Tinder, OkCupid, and Bumble have vulnerabilities that make users’ personal information potentially available to stalkers, spammers, and hackers. Security breaches, which vary in severity and scope, can expose people’s names, logins, locations, message history, and other account activity.
Fitness Balance app, Heart Monitor, Calories Tracker app [22]Improper platform usage
bypasses apple’s iOS Touch ID security system
Once you scan your fingerprint, the apps briefly display an in-app purchase pop-up, charging $90 to $120, while dimming the screen to make it hard to see the tip. In some cases, even if you refuse to use Touch ID to enable the feature, the app asks you to tap to continue and instead attempts an in-app payment scam.
Children’s smart watches with GPS (R7-2019-57) [23]Insecure client–server communication: interception of sensitive data in transit over the networkThe watches were supposed to be contacted using approved contact numbers via a whitelist mode, but the company discovered that the filters did not even work. The watch even accepted customization commands via text messages. This meant a hacker could change the watch’s settings and put children at risk.
Hacking of a US bank in 2019 due to a flaw in the bank’s website and bypassing two-factor authentication by a cyberattacker [18]Insecure authentication riskThe attacker logged in with the victim’s stolen credentials, and when taken to a page that required a PIN or security response, the attacker used a modified string in the web address that set the computer up as recognized. This allowed them to cross the stage and start electronic transfers.
Philips HealthSuite Health Android app [24]Insufficient data encryptionThe issue, which was traced to insufficient encryption reliability, opened the app up to hackers who could access users’ heart rate, blood pressure, sleep status, weight and body composition, and more.
Pandora, a smart car alarm system [25]Insecure authorization riskStealing a smart alarm user account is not only possible but not that difficult. You do not even need to buy the alarm itself (which can cost a hefty $5000) to steal a Viper or Pandora account. At the time of the study, all you had to do to access the system was to register an account on the website or app and use it to access any other account.
WhatsApp Messenger [26]Poor code qualityUntil recently, WhatsApp had a serious vulnerability that was exploited by attackers to remotely install malware that would monitor “selected” smartphones after making a WhatsApp audio call to them. A WhatsApp exploit that installed Pegasus spyware on Android and iOS devices was discovered and adopted by the Israeli company NSO Group (the maker of the most advanced software tool).
Target app from any application store [18,27]Code forgery riskThe attacker uses code modification through malicious forms of mobile applications, available in app stores, which may resort to phishing attacks to force the user to install the application.
Pokemon Go mobile game [28]Reverse engineeringAn attacker typically downloads a target app from an app store and analyzes it in their local environment using a variety of tools. After that, they can change the code and change the function of the app. Pokemon Go suffered a security breach when it emerged that users had re-engineered the app to know when Pokemon were nearby and catch them within minutes.
The idea behind the Wi-Fi File Transfer application was to open a port on Android and allow a connection from a computer [29]Extraneous functionalityA group of researchers from the University of Michigan discovered hundreds of apps in Google Play that performed an unexpected trick: by effectively turning the phone into a server, they allowed the owner to connect to that phone directly from their computer, just like a website or other Internet service. However, dozens of these apps left unprotected ports open on these smartphones. This allowed attackers to steal data, including contacts or photos, or even install malware.
Table 2. Matrix MAICJN of the number of common factors for the mobile applications insecurity consequences.
Table 2. Matrix MAICJN of the number of common factors for the mobile applications insecurity consequences.
rdmlfrititteoemuilpvctiptepvuadpucslux
rd032152121222331
ml302211011112210
fr220210001001000
it122000001001000
itt511001011210220
eo210010100100121
emu100001000000011
il210010001121100
pv111110010121100
ct210021011010110
ipt210010022102200
epv221100011020200
uad320021011122 010
puc310022100100101
slux100001100000010
Table 3. Matrix F of the dependence of the mobile application insecurity consequences on common factors.
Table 3. Matrix F of the dependence of the mobile application insecurity consequences on common factors.
rdmlfrititteoemuilpvctiptepvuadpucslux
ipu 111 1
ids1111 1
icsc1 1 1
iar1 1 1
iazr1 1 1
efr 1 111
cfr11 11 1 11
pcq1 11 11
ide1 1 1111
rer11 1 111
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zaitseva, E.; Hovorushchenko, T.; Pavlova, O.; Voichur, Y. Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity. Systems 2023, 11, 242. https://doi.org/10.3390/systems11050242

AMA Style

Zaitseva E, Hovorushchenko T, Pavlova O, Voichur Y. Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity. Systems. 2023; 11(5):242. https://doi.org/10.3390/systems11050242

Chicago/Turabian Style

Zaitseva, Elena, Tetiana Hovorushchenko, Olga Pavlova, and Yurii Voichur. 2023. "Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity" Systems 11, no. 5: 242. https://doi.org/10.3390/systems11050242

APA Style

Zaitseva, E., Hovorushchenko, T., Pavlova, O., & Voichur, Y. (2023). Identifying the Mutual Correlations and Evaluating the Weights of Factors and Consequences of Mobile Application Insecurity. Systems, 11(5), 242. https://doi.org/10.3390/systems11050242

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop