Command Injection Threats in Mobile Applications

Jyothy Joseph
2014 Journal of Basic and Applied Engineering Research Print   unpublished
Mobile devices have very huge involvement in daily activates. Many of them are relaying mobile applications for their day to day activities like banking, shopping, communication, etc. But all of them are not having good idea on its security threats. Command injection is one of serious vulnerability involved in many of unsecured mobile applications. Many of them downloading and using multiple mobile applications from unsecured sources. Command injection threat utilizing the secured information
more » ... cured information in unauthorized way and making financial and data loses. This paper trying to list out various types of command injections involved in mobile applications and advisable precautionary measures.
fatcat:gofithdxvbe2nbgv7pyyflbdwq