Native App Security

From MgmtWiki
Revision as of 09:21, 5 December 2018 by Tom (talk | contribs) (Problems)

Jump to: navigation, search

Full Title and Meme

An application that is installed on a user's computing device with full power to act as the user.

Context

Problems

  • One of the worst case scenarios for Native App security is that of payments made directly to a user's bank account without the user selected user agent (browser) presenting the choice to the user.
  • In Open Banking it is proposed that a payment initiator and a bank can both have Native Apps running where the payment initiator app asks the banking app on the same device for permission to remove money from the user's account.
  • The article Watch Out for a Clever Touch ID Scam Hitting the App Store shows how unscrupulous apps can fool the user in to granting access to their bank accounts.

Solutions

  • The Native App exposes its name and the web site that backs it in a manner that allows the user to make a meaningful trust decision.
    • Android play store requires[1] any app that uses a brand name service to be securely bound to a URL that properly exposes that brand.
    • Apple has not released any plans to improve app naming security as of 2018-09-21.
  • Joint use Native Apps are provide to some industries for all to use. It makes the trust decision by the user much more difficult.
  • Same Site was designed to help, but as of (2018-09-21) is not consistently applied.

Organizational Support

  • Rules for apps installed on Apple devices (not clear)
  • Rules for apps installed on Android devices [1]
  • Rules for apps installed on Windows devices are of two types, but it is not clear how the user could possibly distinguish, so the concept has not been helpful.
  • Pre Oauth Entity Trust describes a means to represent third-party application endorsement for health care applications. POET’s goal is to help consumers distinguish between applications that have an endorsement versus applications that have no pedigree (i.e untrusted and could be malicious).

References

  1. 1.0 1.1 Handling Android App Links. https://developer.android.com/training/app-links/

Other References