首页> 外文会议>Applied cryptography and network security >Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols
【24h】

Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols

机译:使用基于OAuth2.0的协议破坏和修复移动应用程序身份验证

获取原文
获取原文并翻译 | 示例

摘要

Although the OAuth2.0 protocol was originally designed to serve the authorization need for websites, mainstream identity providers like Google and Facebook have made significant changes on this protocol to support authentication for mobile apps. Prior research mainly focuses on how the features of mobile operating systems can affect the OAuth security. However, little has been done to analyze whether these significant modifications of the protocol call-flow can be well understood and implemented by app developers. Towards this end, we report a field-study on the Android OAuth2.0-based single-sign-on systems. In particular, we perform an in-depth static code analysis on three identity provider apps including Facebook, Google and Sina as well as their official SDKs to understand their OAuth-related transactions We then dynamically test 600 top-ranked US and Chinese Android apps Apart from various types of existing vulnerabilities, we also discover three previously unknown security flaws among these first-tier identity providers and a large number of popular 3rd-party apps. For example, 41% apps under study are susceptible to a newly discovered profile attack, which unlike prior works, enables remote account hijacking without any need to trick or interact with the victim. The prevalence of vulnerabilities further motivates us to propose/implement an alternative, fool-proof OAuth SDK for one of the affected IdPs to automatically prevent from these vulnerabilities. To facilitate the adoption of our proposed fixes, our solution requires minimal code changes by the 3rd-party-developers of the affected mobile apps.
机译:尽管OAuth2.0协议最初是为满足网站的授权需求而设计的,但主流身份提供商(例如Google和Facebook)已对该协议进行了重大更改,以支持移动应用程序的身份验证。先前的研究主要集中于移动操作系统的功能如何影响OAuth安全性。但是,几乎没有做过什么来分析应用程序开发人员是否可以很好地理解和实施协议调用流程的这些重大修改。为此,我们报告了基于Android OAuth2.0的单点登录系统的现场研究。特别是,我们对包括Facebook,Google和Sina在内的三个身份提供商应用程序及其官方SDK进行了深入的静态代码分析,以了解其与OAuth相关的交易,然后我们动态测试了600个排名第一的美国和中国Android应用程序从各种类型的现有漏洞中,我们还发现了这些第一级身份提供者和大量流行的第三方应用程序中的三个以前未知的安全漏洞。例如,正在研究的应用程序中有41%的应用程序容易受到新发现的配置文件攻击的影响,这与以前的工作不同,它可以进行远程帐户劫持,而无需欺骗或与受害者互动。漏洞的普遍存在进一步激励我们为受影响的IdP之一提议/实施一种替代的,防呆的OAuth SDK,以自动防御这些漏洞。为了促进采用我们建议的修补程序,我们的解决方案要求受影响的移动应用程序的第三方开发人员进行的代码更改最少。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号