AUTOMATED SECURITY TESTING FOR A MOBILE APPLICATION OR A BACKEND SERVER
First Claim
1. A system, comprising:
- a memory that stores computer executable components;
a processor that executes computer executable components stored in the memory, wherein the computer executable components comprise;
an analysis component that analyzes computer instructions of a mobile application and determines an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application; and
a security component that performs a security test for a server device based on the identifier pattern for the one or more server endpoints.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques that facilitate automated security testing of one or more mobile applications and/or one or more backend servers for the one or more mobile applications are provided. In one example, a system includes an analysis component and a security component. The analysis component can analyze computer instructions of a mobile application. The analysis component can also determine an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application. The security component can perform a security test for a server device based on the identifier pattern for the one or more server endpoints.
-
Citations
20 Claims
-
1. A system, comprising:
-
a memory that stores computer executable components; a processor that executes computer executable components stored in the memory, wherein the computer executable components comprise; an analysis component that analyzes computer instructions of a mobile application and determines an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application; and a security component that performs a security test for a server device based on the identifier pattern for the one or more server endpoints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method, comprising:
-
receiving, by a system operatively coupled to a processor, a mobile application; analyzing, by the system, computer instructions of the mobile application; determining, by the system, one or more identifier patterns comprising one or more application programming interfaces for one or more server endpoints associated with the mobile application; and performing, by the system, a security test for a server device based on the one or more identifier patterns for the one or more server endpoints. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer program product for performing automated security testing of a backend server, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to:
-
analyze computer instructions of a mobile application; determine an identifier pattern comprising an application programming interface for one or more server endpoints associated with the mobile application; modify the identifier pattern to generate a modified identifier pattern for the one or more server endpoints; and perform a security test for a server device based on the modified identifier pattern for the one or more server endpoints. - View Dependent Claims (18, 19, 20)
-
Specification