<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Research on (not)Unique experience</title>
    <link>https://fi5t.xyz/en/tags/research/</link>
    <description>Recent content in Research on (not)Unique experience</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Wed, 24 May 2023 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://fi5t.xyz/en/tags/research/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Evolution of vulnerabilities in Android apps</title>
      <link>https://fi5t.xyz/en/posts/evolution-of-vulnerabilities-in-android-apps/</link>
      <pubDate>Wed, 24 May 2023 00:00:00 +0000</pubDate>
      <guid>https://fi5t.xyz/en/posts/evolution-of-vulnerabilities-in-android-apps/</guid>
      <description>&lt;p&gt;The history of Android app development has gone through several notable stages, from small apps running locally, to&#xA;client-server apps, app ecosystems, and super-apps. Each of these stages raised the bar of complexity, creating new&#xA;vulnerabilities, and increased developers&amp;rsquo; concern about the security of both the applications and the data they operate&#xA;with. The operating system itself has evolved, providing developers with more options and security mechanisms. But there&#xA;are always a few more unknowns in this system of equations than meets the eye. This article will cover how mobile app&#xA;vulnerabilities have evolved, what influenced them, what vulnerabilities are relevant now, and what&amp;rsquo;s in store for the&#xA;future.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Mobile application security</title>
      <link>https://fi5t.xyz/en/posts/mobile-apps-security/</link>
      <pubDate>Tue, 23 May 2023 00:00:00 +0000</pubDate>
      <guid>https://fi5t.xyz/en/posts/mobile-apps-security/</guid>
      <description>&lt;p&gt;In 2022, our team discovered 216 vulnerabilities during studies of 25 pairs of apps for Android and iOS platforms. The&#xA;storage of user data in clear text accounted for the largest share of vulnerabilities (14%). Despite the efforts of&#xA;operation system developers and secure application development communities, this class of vulnerability has continued to&#xA;be the most prevalent for several years in a row. This trend will remain relevant in 2023, although it is now very&#xA;simple to use cryptography in mobile applications: both vendor and open-source solutions make working with cryptographic&#xA;primitives easier for developers. Vulnerabilities related to application integrity checks and storing confidential&#xA;information in the code shared second place, with 9% each. Third place (8%) was taken by vulnerabilities related to&#xA;untrusted environment checks.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
