2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00039
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities

Abstract: Modern mobile apps use cloud-hosted HTTP-based API services and heavily rely on the Internet infrastructure for data communication and storage. To improve performance and leverage the power of the mobile device, input validation and other business logic required for interfacing with web API services are typically implemented on the mobile client. However, when a web service implementation fails to thoroughly replicate input validation, it gives rise to inconsistencies that could lead to attacks that can compro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
5

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(24 citation statements)
references
References 31 publications
0
19
0
5
Order By: Relevance
“…Mendoza et al studied the inconsistencies in input validation logic between apps and their respective web API services [5]. They developed a tool to extract requests to web API services from an app, and to infer sample input values that violate the implemented constraints found in the app, such as email address or JSON content validation executed on the client side.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mendoza et al studied the inconsistencies in input validation logic between apps and their respective web API services [5]. They developed a tool to extract requests to web API services from an app, and to infer sample input values that violate the implemented constraints found in the app, such as email address or JSON content validation executed on the client side.…”
Section: Related Workmentioning
confidence: 99%
“…https://github.com/skylot/jadx 3 https://javaparser.org 4 https://github.com/javaparser/javasymbolsolver5 The HTTP request header is a plain text record providing input details for the web API request.…”
mentioning
confidence: 99%
“…Inferring the protocol format is not the primary goal of our analysis. Recently, WARDroid [27] introduces a static-analysis based method to extract web APIs, but it focuses on the implementation logic, which is not the objective of our analysis. However, our technique can certainly integrate these techniques to recognize the message format in addition to the discovery of the web APIs.…”
Section: Leakage Of Privacy Sensitive Data In Mobile Applicationsmentioning
confidence: 99%
“…Most of the time, in order to exchange data and information, a system must interact with other systems using different mechanism. For web service security testing [54,55], this is a critical element, as the mechanism or tool should have the ability to make sure the security interrelate and then manage with remaining components. b) Performance specifies the ability of the mechanism to ensure performance quality and also is a measure of how fast a request of service can be completed.…”
Section: ) Rq1"what Are the Issues Web Service Testing?"mentioning
confidence: 99%
“…Mentioned parameters have become leading issues in web service testing due to its distinctive scalability [11] and confidentiality concerns. Furthermore, real challenging task [12][13][14] in web service testing domain is that it has no Graphic User Interface (GUI) [15]. Thus, web service has no GUI to be verified and tested.…”
Section: Introductionmentioning
confidence: 99%