MSTG Book Sprint - Android Testing Guide

owasp mstg


As of today, no widely accepted standard for mobile app security exists. The goal of our project is to rectify this situation. In addition to a mobile appsec security standard, we are producing a comprehensive testing guide that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results. We aim to release the guide in the form of a free e-book and potentially a printed book by the end of this year.


The objective of this working session is to complete a first draft of the Mobile Security Testing Guide (MSTG). Tasks include:

  • Write original content, such as describing testing processes and writing test cases
  • Proofread and technical edit to improve the overall quality of the MSTG

Participants may join working groups organised along the main topics covered in the guide. Work will be split between working groups based on mobile OS and topics as listed below.

This working session focuses on mobile testing application security on Android.

Associated chapters in the MSTG:


Looking to complete an early release version of the Mobile Security Testing Guide (MSTG) by end of the week.

Synopsis and Takeaways

  • Substantial progress on Encryption Chapter. Finalising Android exception handling for IOS & Android and Integrity testing for IOS

  • QA Process for Android Chapter

  • On target for early access version

  • Looking for sponsorship

How to Join

Follow the “Edit this page here” link at the bottom of this page and add yourself to the “participants” field. Signing up is not mandatory, but helps us to better organize the sessions.

More things to do once you have signed up:

  • Make yourself familiar with the existing content. Or even better, start contributing right away :)
  • Ping us on the OWASP MSTG Slack channel (sushi2k or bernhardm).
  • If you have rooted Android / jailbroken iOS devices, please bring them along to the session.


The target audience for this Working Session is:

  • Developers
  • Security Testers
  • Reverse Engineers
  • Everyone else with good writing skills and some technical know-how :)

Working materials

Back to list of all Working Sessions and Tracks

Edit this page here