Ramírez López, Francisco JoséVarela Vaca, Ángel JesúsRopero Rodríguez, JorgeLuque Rodríguez, JoaquínCarrasco Muñoz, Alejandro2024-01-042024-01-042019-12Ramírez López, F.J., Varela Vaca, Á.J., Ropero Rodríguez, J., Luque Rodríguez, J. y Carrasco Muñoz, A. (2019). A framework to secure the development and auditing of SSL pinning in mobile applications: The case of android devices. Entropy, 21 (12), Article number 1136. https://doi.org/10.3390/e21121136.1099-4300https://hdl.handle.net/11441/152937Article number 1136The use of mobile devices has undergone rapid growth in recent years. However, on some occasions, security has been neglected when developing applications. SSL/TLS has been used for years to secure communications although it is not a vulnerability-free protocol. One of the most common vulnerabilities is SSL pinning bypassing. This paper first describes some security controls to help protect against SSL pinning bypassing. Subsequently, some existing methods for bypassing are presented and two new methods are defined. We performed some experiments to check the use of security controls in widely used applications, and applied SSL pinning bypassing methods. Finally, we created an applicability framework, relating the implemented security controls and the methods that are applicable. This framework provides a guideline for pentesters and app developers.application/pdf19 p.engAtribución 4.0 Internacionalhttp://creativecommons.org/licenses/by/4.0/SSL pinningSecurityMobile applicationsAndroidAuditingVulnerabilitiesOWASPA framework to secure the development and auditing of SSL pinning in mobile applications: The case of android devicesinfo:eu-repo/semantics/articleinfo:eu-repo/semantics/openAccesshttps://doi.org/10.3390/e21121136