1. ASTQB Certified Mobile Tester Syllabus (2019): Section 4.3, "Security testing," outlines common security vulnerabilities for mobile applications. Learning Objective MO-4.3.2 specifically requires candidates to "give examples of security vulnerabilities for mobile applications," which prominently includes insecure data storage. The syllabus details checking for sensitive data stored in insecure locations as a key testing activity.
2. OWASP Mobile Application Security Verification Standard (MASVS): The MASVS is a community-led standard for mobile app security, widely referenced in academic and professional contexts. In section "V2: Data Storage and Privacy Requirements," it explicitly states as a requirement (MASVS-STORAGE-1): "System credential storage facilities are used to store sensitive data, such as PII, user credentials or cryptographic keys." Testers are tasked with verifying this.
3. Kanaker, O., & Al-Hawari, F. (2021). A Comprehensive Review on Mobile Application Security. International Journal of Interactive Mobile Technologies (iJIM), 15(07), pp. 18–38. This academic review emphasizes that "Insecure data storage is one of the most common vulnerabilities in mobile applications" (p. 24). The role of testing is to identify such vulnerabilities where sensitive data is stored improperly on the device's local storage. DOI: https://doi.org/10.3991/ijim.v15i07.20911