Главная
Study mode:
on
1
Intro
2
Explosion in Mobile Attacks
3
APIs Open New Business Opportunities and
4
Instagram API Attack
5
Ship Raider Shipper's Edge
6
App Identity using API keys
7
Keeping Secrets: Attack Surfaces
8
Don't Publish Your Keys
9
How Ship Raider Stole the API key
10
Detect and Block Abnormal Usage of APIs
11
Rate Limiting and Load Shedding
12
Behavioral API Security
13
Breaking TLS
14
Certificate Pinning
15
Pinning Upkeep
16
Remove Secret from the Channel
17
How ShipRaider Broke the HMAC
18
Calculate Secret at Runtime
19
Ship Raider Steals Runtime Secret
20
App Hardening Approaches
21
OAuth2 Overview
22
Abstract Protocol Flow
23
User's Outh2 Code Grant Flow
24
OAuth2 Refresh Tokens
25
OAuth2 Proof of Key Code Exchange (PKCE)
26
API Proxy Pattern
27
Secret as a Service
28
App Integrity Measurement
29
Strengthening OAuth2 Flow
30
ShipShape
31
Architecture Pattern
32
Conclusion
Description:
Explore mobile app and API security strategies in this OWASP Foundation conference talk from AppSecCali 2019. Follow the fictional ShipFast courier service as it evolves its security approach to counter threats from the malicious ShipRaider. Dive into topics such as OAuth2 user authorization, TLS, certificate pinning, HMAC call signing, app hardening, and white box crypto. Learn about man-in-the-middle attacks, app decompilation, debugging, and reverse engineering techniques used by attackers. Gain insights into defense-in-depth techniques for protecting both mobile apps and API backends. Access fully worked open source examples and additional homework assignments for deeper exploration. Presented by Skip Hovsmith, Principal Engineer at CriticalBlue, this 53-minute talk covers a wide range of mobile security topics, including API keys, rate limiting, behavioral API security, app integrity measurement, and OAuth2 flow strengthening.

Preventing Mobile App and API Abuse

OWASP Foundation
Add to list
0:00 / 0:00