Mobile Application Assessment

ARE THERE WEAKNESSES IN YOUR CONSUMER OR COMMERCIAL MOBILE APPLICATIONS?

Using our mobile application assessment methodology, we conduct in-depth static and dynamic (run-time) analyses of iOS and Android devices, irrespective of source code availability.

OUR
APPROACH

MAA can help you gauge multiple attack vectors and risks such as:

  • Sensitive data storage, Touch ID, and keychain use
  • Network communications
  • Web services and API back ends
  • Custom URL schemes
  • Bluetooth/BLE security issues
  • Reverse-engineered mobile binary code, frameworks, and libraries
  • Bypassed client-side protections, including SSL pinning and anti-jailbreaking
  • Insecure practices for mobile application development, when source code is available

Other
Services

Application Penetration Testing

We help determine your application’s security posture by employing the same tactics real-world attackers use, letting us discover your attack surface in the most realistic way possible, and identifying weaknesses that lead to your most likely paths of compromise.

Hybrid Application Assessment

By combining a dynamic penetration test of a deployed application with the depth of source code analysis, we can dive deeper into your application, test for a broader range of vulnerabilities, and provide higher confidence results.

“We chose Bishop Fox as they come with an impressive pedigree. Bishop Fox specializes in security consulting services for various Fortune 100 companies and eight of the top 10 global technology companies around the world. They also work with major studios, so we knew they were the right people for the job.”

— Chris McMahon, Head of Content and Communication at Ftrack

Let’s
Talk

Whether you know exactly which services you need, or want help in figuring out what solution is best for you, we can help.