Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0001-9005-0543
2025 (English)In: Secure IT Systems / [ed] Leonardo Horn Iwaya, Liina Kamm, Leonardo Martucci, Tobias Pulls, Springer , 2025, Vol. 15396 LNCS, p. 364-381Conference paper, Published paper (Refereed)
Abstract [en]

Mobile health applications (mHealth apps), particularly in the health and fitness category, have experienced an increase in popularity due to their convenience and availability. However, this widespread adoption raises concerns regarding the security of the user’s data. In this study, we investigate the security vulnerabilities of ten top-ranked Android health and fitness apps, a set that accounts for 237 million downloads. We performed several static and dynamic security analyses using tools such as the Mobile Security Framework (MobSF) and Android emulators. We also checked the server’s security levels with Qualys SSL, which allowed us to gain insights into the security posture of the servers communicating with the mHealth fitness apps. Our findings revealed many vulnerabilities, such as insecure coding, hardcoded sensitive information, over-privileged permissions, misconfiguration, and excessive communication with third-party domains. For instance, some apps store their database API key directly in the code while also exposing their database URL. We found insecure encryption methods in six apps, such as using AES with ECB mode. Two apps communicated with an alarming number of approximately 230 domains each, and a third app with over 100 domains, exacerbating privacy linkability threats. The study underscores the importance of continuous security assessments of top-ranked mHealth fitness apps to better understand the threat landscape and inform app developers. 

Place, publisher, year, edition, pages
Springer , 2025. Vol. 15396 LNCS, p. 364-381
Keywords [en]
Differential privacy, Electronic health record, mHealth, Empirical studies, Health and fitness apps, Mobile health application, Penetration testing, Security, Security analysis, Security testing, Security vulnerabilities, Static security analysis, Statics and dynamics
National Category
Computer Sciences Software Engineering Information Systems
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-104055DOI: 10.1007/978-3-031-79007-2_19ISI: 001446544900019Scopus ID: 2-s2.0-85218497704OAI: oai:DiVA.org:kau-104055DiVA, id: diva2:1954605
Conference
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024.
Available from: 2025-04-25 Created: 2025-04-25 Last updated: 2025-04-25Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Iwaya, Leonardo H

Search in DiVA

By author/editor
Iwaya, Leonardo H
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer SciencesSoftware EngineeringInformation Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 6 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf