ENSURING USER SECURITY IN MOBILE APPLICATIONS: CYBERSECURITY TECHNIQUES

Authors

  • Qurbonov Behruz Amrulloyevich Author
  • Yondoshaliyev Alisher Elyorjon o‘g‘li Author

Keywords:

Keywords: Cybersecurity, Data Encryption: Symmetric and Asymmetric, Multi-Factor Authentication , Phishing Detection.

Abstract

Abstract: Mobile applications have become integral to daily life, facilitating communication, commerce, and entertainment. However, their widespread adoption has made them prime targets for cyberattacks, such as data breaches, malware, and phishing. Ensuring user security in mobile applications is critical to protecting sensitive data and maintaining trust. Cybersecurity techniques, enhanced by Artificial Intelligence (AI), encryption, and secure coding practices, play a pivotal role in mitigating these risks. This article explores the fundamentals of securing mobile applications, addressing key techniques, challenges, solutions, and mathematical formulations to quantify security metrics. It also includes algorithms to support implementation, focusing on practical approaches for developers.

References

1. Owusu, E., et al. (2012). Investigating the Predictability of Secure Contexts on Smartphones . Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS).

2. Enck, W., et al. (2010). Understanding Android Security . IEEE Transactions on Mobile Computing.

3. Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011). Android Permissions Demystified . Proceedings of the 2011 ACM Conference on Computer and Communications Security.

4. ISO/IEC 27001:2013 – Information technology — Security techniques — Information security management systems — Requirements .

5. Zhang, Y., et al. (2013). Analyzing Private Information Exposure in Android Applications . IEEE International Conference on Software Security and Reliability.

6. Shabtai, A., et al. (2012). Google Play Store Malware Analysis Using Machine Learning . Computers & Security.

7. The Open Web Application Security Project (OWASP). (2021). Mobile Top 10 Vulnerabilities . https://owasp.org/www-project-mobile-security/

8. Zhi, L., & Qing, H. (2014). A Framework for Secure Communication in Android Mobile Applications . Journal of Network and Computer Applications.

9. Spreitzer, R., & Moonsamy, V. (2016). Practical Evaluation of Lightweight Cryptographic Algorithms for Mobile Devices . IEEE Access.

10. Balebako, R., Lin, J., & Cranor, L.F. (2013). Privacy Management in Mobile Ecosystems: The State of the Art . IEEE Security & Privacy.

Published

2025-06-28

How to Cite

Qurbonov Behruz Amrulloyevich, & Yondoshaliyev Alisher Elyorjon o‘g‘li. (2025). ENSURING USER SECURITY IN MOBILE APPLICATIONS: CYBERSECURITY TECHNIQUES. JOURNAL OF NEW CENTURY INNOVATIONS, 79(2), 268-272. https://scientific-jl.com/new/article/view/23628