the betrayal at cloud city
play

The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based - PowerPoint PPT Presentation

The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends Omar Alrawi* , Chaoshun Zuo * , Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio *First Co-Authors Conference Conference Conference More


  1. The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends Omar Alrawi* , Chaoshun Zuo * , Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, Brendan Saltaformaggio *First Co-Authors

  2. Conference

  3. Conference

  4. Conference

  5. More Than What’s on The Surface

  6. Mobile App More Than What’s on The Surface

  7. Mobile App More Than What’s on The Surface Cloud Backend

  8. Mobile App More Than What’s on The Surface Web App Cloud Backend

  9. Mobile App More Than What’s on The Surface Web App Software Services Cloud Backend

  10. Mobile App More Than What’s on The Surface Web App Software Services Operating System Cloud Backend

  11. Mobile App More Than What’s on The Surface Web App Software Services Operating System Cloud Backend (v)Hardware

  12. Mobile Backends All Over the News

  13. Mobile Backends All Over the News

  14. Mobile Backends All Over the News

  15. Prior Work • The rise of backends • Acar et al. "SoK: Lessons learned from android security research for appified software platforms." IEEE S&P , 2016.

  16. Prior Work • The rise of backends • Acar et al. "SoK: Lessons learned from android security research for appified software platforms." IEEE S&P , 2016. • Evolution of backends

  17. Prior Work • The rise of backends • Acar et al. "SoK: Lessons learned from android security research for appified software platforms." IEEE S&P , 2016. • Evolution of backends • App Thinning 1 [1] Mojica, Gregg. Working with App Thinning in iOS 9https://www.appcoda.com/app-thinning/, Accessed Aug 2019

  18. Prior Work • The rise of backends • Acar et al. "SoK: Lessons learned from android security research for appified software platforms." IEEE S&P , 2016. • Evolution of backends • App Thinning 1 • Security of Backends [1] Mojica, Gregg. Working with App Thinning in iOS 9https://www.appcoda.com/app-thinning/, Accessed Aug 2019

  19. Prior Work • The rise of backends • Acar et al. "SoK: Lessons learned from android security research for appified software platforms." IEEE S&P , 2016. • Evolution of backends • App Thinning 1 • Security of Backends • Zuo et al. "Authscope: Towards automatic discovery of vulnerable authorizations in online services." ACM CCS ., 2017 • Zuo et al. "Why does your data leak? uncovering the data leakage in cloud from mobile apps.” IEEE S&P . 2019 • Appthority 2 [1] Mojica, Gregg. Working with App Thinning in iOS 9https://www.appcoda.com/app-thinning/, Accessed Aug 2019 [2] K. Watkins, “HospitalGown: The Backend Exposure Putting Enterprise Data at Risk,” Appthority, Tech. Rep., 2017.

  20. Mel is an app developer. Mel just wants to ship his killer app.

  21. Mobile App Web App Software Services Mel is an app Operating System developer. (v)Hardware Mel just wants to ship his killer app.

  22. Let’s Help Mel

  23. Challenges for Mel Let’s Help Mel

  24. Challenges for Mel • What backends does my app use? Let’s Help Mel

  25. Challenges for Mel • What backends does my app use? • How do I check if they are secure? Let’s Help Mel

  26. Challenges for Mel • What backends does my app use? • How do I check if they are secure? Let’s Help Mel • How do I fix them?

  27. Challenges for Mel • What backends does my app use? • How do I check if they are secure? Let’s Help Mel • How do I fix them? • Can I fix them (attribution)?

  28. Challenges for Mel • What backends does my app use? • How do I check if they are secure? Let’s Help Mel • How do I fix them? • Can I fix them (attribution)?

  29. Challenges for Mel • What backends does my app use? • How do I check if they are secure? Let’s Help Mel • How do I fix them? • Can I fix them (attribution)? Mel’s Dream: Upload APK and vet all backends!

  30. What Backends My App Uses?

  31. What Backends My App Uses?

  32. What Backends My App Uses?

  33. What Backends My App Uses?

  34. What Backends My App Uses?

  35. What Backends My App Uses?

  36. How Many Backends?

  37. How Many Backends? 10 or More Unique Backends on Average

  38. How Many Backends? 10 or More Unique Backends on Average

  39. How Do I Check If They Are Secure?

  40. How Do I Check If They Are Secure?

  41. First: Bug finding via input perturbation How Do I Check If They Are Secure?

  42. First: Bug finding via input perturbation How Do I Check If They Are Secure?

  43. First: Bug finding via input perturbation How Do I Check If They Are Secure?

  44. First: Bug finding via input perturbation How Do I Check If They Are Secure?

  45. First: Bug finding via input perturbation How Do I Check If They Are Secure? SQLi, XSS, XXE

  46. How Do I Check If They Are Secure?

  47. Second: Scan services for known vulnerabilities How Do I Check If They Are Secure?

  48. Second: Scan services for known vulnerabilities 65K Ports How Do I Check If They Are Secure?

  49. Second: Scan services for known vulnerabilities 65K Ports How Do I Check If They Are Secure?

  50. Second: Scan services for known vulnerabilities 65K Ports How Do I Check If They Are Secure?

  51. Second: Scan services for known vulnerabilities 65K Ports How Do I Check If They Are Secure?

  52. Second: Scan services for known vulnerabilities 65K Ports How Do I Check If They Are Secure?

  53. Can I Fix Them?

  54. Mobile App Web App Software Services Can I Fix Them? Operating System (v)Hardware

  55. First-Party: If Mel owns the whole stack Mobile App Web App Software Services Can I Fix Them? Operating System (v)Hardware

  56. First-Party: If Mel owns the whole stack Mobile App Mel is responsible for this portion Web App Software Services Can I Fix Them? Operating System (v)Hardware

  57. Mobile App Web App Software Services Can I Fix Them? Operating System (v)Hardware

  58. Third-Party: If Mel uses an SDK Mobile App SDK Access Web App Software Services Can I Fix Them? Operating System No Access! (v)Hardware

  59. Mobile App Web App Software Services Can I Fix Them? Operating System (v)Hardware

  60. Hybrid: If Mel uses a rented platform Mobile App Mel is responsible for this portion Web App Software Services Can I Fix Them? Operating System (v)Hardware

  61. Hybrid: If Mel uses a rented platform Mobile App Mel is responsible for this portion Web App Software Services Can I Fix Them? Operating System Platform Provider is responsible Rented! for this portion (v)Hardware

  62. How Do I Fix Them?

  63. How Do I Fix Them?

  64. How Do I Fix Them? Data Aggregation and Consolidation

  65. How Do I Fix Them? Data Aggregation and Consolidation

  66. How Do I Fix Them? Data Aggregation and Consolidation

  67. How Do I Fix Them? Data Aggregation and Consolidation

  68. Geo and Net Distribution How can Mel be expected to solve everything?

  69. Google Play Store

  70. Google Play Store • Top 5,000 apps from August 2018

  71. Google Play Store • Top 5,000 apps from August 2018 • We found • Over 600 0-DAY • Over 900 N-DAY

  72. Google Play Store Mobile App • Top 5,000 apps from August 2018 Web App • We found Software Services • Over 600 0-DAY • Over 900 N-DAY Operating System (v)Hardware

  73. Google Play Store Mobile App • Top 5,000 apps from August 2018 Web App • We found Software Services • Over 600 0-DAY • Over 900 N-DAY • 0-day vulnerabilities affect web Operating System apps (v)Hardware

  74. Google Play Store Mobile App • Top 5,000 apps from August 2018 Web App • We found Software Services • Over 600 0-DAY • Over 900 N-DAY • 0-day vulnerabilities affect web Operating System apps • N-day affects software below the (v)Hardware web apps

  75. Overall Vulnerabilities

  76. Overall Vulnerabilities Over 1,600 Vulnerability Instances

  77. Overall Vulnerabilities

  78. Overall Vulnerabilities Over 600 ZERO-DAYS!

  79. Overall Vulnerabilities

  80. Overall Vulnerabilities Audited over 9,000 backends

  81. Overall Vulnerabilities

  82. Overall Vulnerabilities Over 1,000 third-party backends. Used by multiple mobile apps!

  83. Top Vulnerabilities

  84. Top Vulnerabilities

  85. Top Vulnerabilities

  86. Top Vulnerabilities

  87. Top Vulnerabilities

  88. Top Vulnerabilities

  89. Top Vulnerabilities BEWARE: Can Install Malicious Apps Through Redirection

  90. Top Vulnerabilities

  91. Top Vulnerabilities

  92. Top Zero-Day Vulnerabilities

  93. Top Zero-Day Vulnerabilities

  94. Top Zero-Day Vulnerabilities

  95. http tps: s://Mobil bileBackend.vet

  96. What’s Next? WORKING WITH 3 RD NOTIFICATION IMPACT ON APP USERS PARTY LIBRARIES

Recommend


More recommend