OWASP Mobile Top 10: M4 Unintended Data Leakage

Null Bangalore Meet

18 October 2014

Abstract

This month discussion : M4: Unintended Data Leakage

We will discuss about what is data leakage, places where data could be leaked. sample /examples of data leakage and how it differes from M2: Insecure data storage.

Slides

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation covers OWASP Mobile Top 10 Risk M4: Unintended Data Leakage, explaining how mobile operating systems can inadvertently expose sensitive user data through side-channel mechanisms that developers often overlook. Anant Shrivastava distinguishes this risk from M2 (Insecure Data Storage), demonstrates real-world leakage through Android logging and Firefox, and provides a comprehensive catalog of leakage vectors with practical prevention strategies.

Key Topics Covered

Actionable Takeaways

  1. Never log credentials, PII, or other sensitive data to system logs — audit all logging statements before release and strip verbose logging in production builds.
  2. Remove or obscure sensitive on-screen data before the OS captures backgrounding screenshots, using platform APIs to prevent screenshot capture of sensitive screens.
  3. Disable keystroke logging on fields that accept sensitive input (passwords, credit card numbers) and use anti-caching directives for web content displayed in WebViews.
  4. Thoroughly debug and inspect applications before release to identify all files created, cached data, and log output that may contain sensitive information.
  5. Review all third-party libraries for the data they collect and transmit, and test applications across multiple platform versions since data leakage behaviors can vary.
  6. Disable clipboard copy functionality on screens displaying sensitive documents, and clean up temporary directories after processing sensitive data.

Social chatter