Trending News

Texas A&M Professor Researching Mobile Applications Security

Texas A&M Professor Researching Mobile Applications Security

Staff Reporter

Smartphones, tablets, iPads - mobile devices have become invaluable to the everyday consumer. But few consider the security issues that occur when using these devices.

Modern mobile applications or "apps" use cloud-hosted HTTP-based application programming interface (API) services and heavily rely on the internet infrastructure for data communication and storage. To improve performance and leverage the power of the mobile device, input validation and other business logic required for interfacing with web API services are typically implemented on the mobile client. However, when a web service implementation fails to thoroughly replicate input validation, it gives rise to inconsistencies that could lead to attacks that can compromise user security and privacy. Developing automatic methods of auditing web APIs for security remains challenging.

Dr. Guofei Gu, associate professor in the Department of Computer Science and Engineering at Texas A&M University and director of the SUCCESS lab, together with his doctoral students Abner Mendoza and Guangliang Yang, are working to combat these security issues.

Gu and his team analyzed 10,000 mobile apps and found that many of them are open to web API hijacking - something that potentially affects the privacy and security of tens of millions of business users and consumers globally.

The root of the threat lies in the inconsistencies that are often found between app and server logic in web API implementations for mobile apps. Gu's team created the WARDroid framework to crawl applications, automatically carrying out reconnaissance and uncovering these kinds of inconsistencies, using static analysis along with what kinds of HTTP requests are accepted by the server. Once an attacker has the information on what these requests look like, he or she can carry out their own actions by tweaking a few parameters.

As a simple example, Gu explains in a vulnerable shopping app/server, a malicious user could shop for free by making some of the item prices in the shopping cart as negative (with tweaking some HTTP parameters), which should not be allowed by the app but unfortunately can be accepted by the server.

After identifying many vulnerable real-world mobile apps/servers that affect millions of users, Gu's team has communicated with the developers to help them fix the vulnerabilities. This research has already generated real-world impacts. Their research paper was published in proceedings of the 2018 Institute of Electrical and Electronics Engineers (IEEE) Symposium on Security & Privacy (S&P'18), one of the most prestigious top conferences in cybersecurity with an acceptance rate lower than 12 percent. This work has also been reported in several media outlets, including Slashdot, BLEEPINGCOMPUTER, ThreatPost and SecurityBoulevard.

This is just one example of Gu's research on mobile app security. At the same conference Gu's team had another research paper on mobile app security that identifies a new type of vulnerability named Origin Stripping Vulnerabilities (OSV) in modern hybrid mobile apps and introduces a new mitigation solution OSV-Free (which is released as open source at https://success.cse.tamu.edu/lab/osv-free.php). For more details on Gu's research on mobile security, please visit his lab's website.

© Copyright 2020 Mobile & Apps, All rights reserved. Do not reproduce without permission.

more stories from Trending News

  • Trending News

    The Slip and Fall Law

    The onus lies on you to prove to the insurance company that the property's hazardous situations caused your fall and injuries.

  • How To

    Tax Tips for Small Businesses

    Tax is an uncomfortable subject for some people. It's complicated but compulsory. Small business owners may feel overwhelmed by the regulations

  • Trending News

    4 SEO Problems That a New Website Won't Fix

    Are you considering blowing up your website and building it from scratch? Are you unhappy with how your current site is performing or ranking?

  • Culture

    The Best Projects for Your Raspberry Pi

    If you haven't heard of the Raspberry Pi, this device represents one of the best and most handy innovations of the previous decade. If you haven't heard of the Raspberry Pi, this device represents one of the best and most handy innovations of the previous decade.

  • Trending News

    Five Tips for Building a Website When You Don't Have a Lot of Time

    There was once a time when websites were just for businesses and bloggers. That's not the case anymore. Today, everyone should have a website. Even if you aren't starting a small business and don't want to spend every spare minute writing articles for your blog, having a website is like having a digital business card. It's a great way to showcase your professional portfolio for anyone and everyone who might be interested in hiring you.

  • Trending News

    5 Things You Should Know About Investment Intelligence

    Investors know that investing money is always a big decision. With that being said, on the one hand, there are risks involved, and, on the other, there are also opportunities for great returns. This causes investors to be very strategic about their decision-making process.

  • Trending News

    Tips for Using Google Ads in 2020

    Google Ads is a tremendously powerful advertising platform. You can target specific types of people, searching for specific things at specific times of the day, in specific locations!

  • Trending News

    How to Use Digital Strategy to Promote Your Online Business

    Your business's digital strategy must be revisited regularly and adjusted to your company’s needs. In the ever-changing world of online business, you need to make sure that your venture stays relevant and that you're always one step ahead of your competitors.

    To have the biggest impact, build a strong website and concentrate on SEO, which you can boost through a blog. Focus on email marketing campaigns, press releases, and competitions to raise awareness. If you aren’t sure where to start, outsource to a consultant.

Back
Real Time Analytics