OWASP MOBILE TOP 10:2024 ALIGNED
Mobile Application Security
Assessment
Platform-native assessment of iOS and Android applications - combining static analysis, dynamic testing, and reverse engineering, delivered through NST Assure.
Mobile applications extend enterprise risk beyond the perimeter. We assess native iOS, Android, and cross-platform applications across binary protections, data storage, network communication, authentication, and platform interaction - covering both static and dynamic analysis - delivered through NST Assure, our PTaaS platform for continuous assurance.
01
HARDENING, OBFUSCATION & ANTI-TAMPERING
Binary & Platform Security
Assesses the resilience of compiled application binaries against reverse engineering, tampering, and runtime manipulation.
Binary protections - code obfuscation, anti-debugging, and integrity verification
Reverse engineering resilience - decompilation resistance, symbol stripping, and class-dump exposure
Runtime manipulation - method swizzling, Frida hooking, and instrumentation bypass
Jailbreak & root detection - detection logic validation and bypass-resistance testing
Platform Interaction - IPC abuse, deep-link hijacking, and intent-filter exploitation
Let's Start →
BINARY & RUNTIME VECTORS
M7 - Insufficient Binary Protections
Critical
Runtime Hooking & Instrumentation
Hook
Jailbreak / Root Bypass
JB
IPC & Deep-Link Hijacking
IPC
BINARY
REVERSE ENG
RASP
IPC
02
CREDENTIALS, BIOMETRICS & TOKEN HANDLING
Authentication & Session Management
Validates identity controls from biometric authentication to token lifecycle management across mobile-specific flows.
Credential handling - hardcoded secrets, insecure storage, and credential-reuse patterns
Biometric authentication - TouchID/FaceID bypass, fallback weaknesses, and local-auth logic flaws
Token & session security - token storage, expiry enforcement, and session-binding validation
SSO & OAuth flows - mobile redirect-URI abuse, PKCE enforcement, and custom-scheme hijacking
Device binding - attestation validation, device-trust signals, and multi-device session controls
Let's Start →
MOBILE AUTH VECTORS
M1 - Improper Credential Usage
Critical
M3 - Insecure Authentication/Authorization
High
Biometric Bypass & Fallback Abuse
Bio
OAuth Custom-Scheme Hijacking
OAuth
AUTH
CREDENTIAL
BIOMETRIC
SESSION
03
LOCAL STORAGE, KEYCHAIN/KEYSTORE & PII
Data Storage & Privacy Controls
Examines how sensitive data is stored, cached, and exposed on-device - including privacy compliance across regulatory frameworks.
Insecure data storage - local databases, shared preferences, and plaintext file exposure
Keychain & Keystore - access-control validation, protection-class audit, and hardware-backed key usage
Clipboard & cache leakage - pasteboard exposure, screenshot capture, and keyboard-cache persistence
Backup & logging - sensitive data in iCloud/ADB backups and verbose log output
Privacy controls - consent enforcement, data-minimisation, and PII-handling compliance
Let's Start →
DATA-AT-REST RISK SURFACE
M9 - Insecure Data Storage
Critical
M6 - Inadequate Privacy Controls
Privacy
M10 - Insufficient Cryptography
Crypto
Backup & Cache Data Exposure
Leak
STORAGE
KEYCHAIN
PRIVACY
PII
04
TLS, CERTIFICATE PINNING & API COMMUNICATION
Network & Transport Security
Validates all data-in-transit protections from certificate pinning to backend API communication security.
Insecure communication - cleartext traffic, mixed-content, and transport-security exceptions
Certificate pinning - pin validation, bypass resilience, and certificate-rotation handling
Man-in-the-middle - proxy detection, SSL interception, and trust-store manipulation
API traffic analysis - request tampering, response manipulation, and sensitive-data exposure in transit
Input/output validation - client-side injection, WebView script injection, and deep-link parameter abuse
Let's Start →
DATA-IN-TRANSIT VECTORS
M5 - Insecure Communication
Critical
M4 - Insufficient Input/Output Validation
I/O
Certificate Pinning Bypass
Pin
MitM & Proxy Detection Evasion
MitM
TLS
PINNING
MITM
WEBVIEW
05
FLUTTER, REACT NATIVE, SDKS & DEPENDENCIES
Supply Chain & Cross-Platform Security
Evaluates third-party dependencies, cross-platform framework risks, and the mobile build pipeline from source to distribution.
Supply chain integrity - SDK provenance, dependency-confusion, and malicious package detection
Cross-platform frameworks - Flutter, React Native, and Kotlin Multiplatform-specific security gaps
Third-party SDK risk - data-collection behaviour, permissions scope, and embedded tracker analysis
Build & distribution - signing-key management, store-deployment hygiene, and sideloading exposure
Security misconfiguration - exported components, debug flags, and overly broad permission requests
Let's Start →
SUPPLY CHAIN & CONFIG RISKS
M2 - Inadequate Supply Chain Security
Critical
M8 - Security Misconfiguration
Config
Cross-Platform Framework Exposure
XPlat
Third-Party SDK & Tracker Audit
SDK
SUPPLY CHAIN
FLUTTER
REACT NATIVE
SDK AUDIT
06
NST ASSURE - PTAAS DELIVERY
NST Assure - Standards & Continuous Assurance
Findings mapped to mobile-specific frameworks and delivered through NST Assure for collaborative remediation.
OWASP Mobile Top 10:2024 - full coverage across all ten risk categories
OWASP MASVS - mobile verification across MASVS-STORAGE, AUTH, NETWORK, PLATFORM, and CRYPTO
OWASP MASTG - atomic test methodology aligned to the Mobile Security Testing Guide
NST Assure platform - real-time reports, trackers, POC artefacts, and revalidation workflows
Continuous assurance - release-cycle validation and posture tracking across app versions
Let's Start →
NST ASSURE - STANDARDS & DELIVERY
OWASP Mobile Top 10:2024
Latest
OWASP MASVS Control Groups
Verify
OWASP MASTG Atomic Tests
MASTG
NST Assure - PTaaS Platform
Delivery
NST ASSURE
MOBILE TOP 10
MASVS
PTAAS
Ready to secure your mobile applications?
Share your requirements - we'll scope an assessment aligned to your mobile platforms and risk profile.