Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Demystifying OWASP Top 10 Mobile Risks

GDG Montreal
March 07, 2024
12

Demystifying OWASP Top 10 Mobile Risks

In this talk we'll have a comprehensive look at the most common security risks that affect mobile applications according to the Open Web Application Security Project, with interesting code samples in Flutter/Dart, as well as some tips and tricks on how to prepare our apps to walk around each potential security risk.

GDG Montreal

March 07, 2024
Tweet

Transcript

  1. Aims to improve software security through community-led projects, local chapters,

    documentation and training Key initiatives: OWASP Top Ten, OWASP projects, local chapters Funded through memberships, corporate sponsorships and conferences Community-driven collaboration
  2. • M1: IMPROPER CREDENTIAL USAGE • M2: INADEQUATE SUPPLY CHAIN

    SECURITY • M3: INSECURE AUTHENTICATION/AUTHORIZATION • M4: INSUFFICIENT INPUT/OUTPUT VALIDATION • M5: INSECURE COMMUNICATION • M6: INADEQUATE PRIVACY CONTROLS • M7: INSUFFICIENT BINARY PROTECTIONS • M8: SECURITY MISCONFIGURATION • M9: INSECURE DATA STORAGE • M10: INSUFFICIENT CRYPTOGRAPHY