Главная
Study mode:
on
1
RSAConference 2020 San Francisco February 24-28 Moscone Center
2
The Dark API Economy
3
Mobile Apps Rely on APIs
4
Mobile Attack Surfaces
5
OWASP Security Risks
6
API Defense Objectives
7
The ShipFast Driver App
8
API Sequence for Pick Up and Delivery
9
The Ship Raider Bench and Driver App
10
ShipRaider's API Exploit
11
Initial Security Posture
12
User Authorization is not Service Authorization
13
Common API Gateway Defenses
14
API Proxy Pattern
15
Inspect the App Package
16
Obfuscate Code and Secrets in Code
17
Observe/Manipulate Communication Channel
18
Certificate Pinning
19
Pin the Channel • Generate public key fingerprint
20
Unpin the Channel
21
Block Rooting and Instrumentation
22
Nervous Product Manager
23
a: Use App-Level Message Protection
24
Defense 4b: Removing Secrets from App Package
25
Find Message Signing Secret
26
a: Improve Run-Time Defenses
27
Moving secrets and security decisions off device
28
Defense 5b: Authenticate the App Off Device
29
Attacker Pivots to a Less Secure App
30
OAuth2 Authorization Flow
31
Mobile Authorization Flow with PKCE
32
Strengthen OAuth2 with Attested App ID
33
Authorization in Context
34
Apply What You Learn Today
Description:
Explore the world of API security in mobile applications through an engaging conference talk that pits Shipfast against ShipRaider in a battle for control over a driver delivery app. Dive into various attack vectors and defense mechanisms, including API key exploitation, OAuth2 user authorization, TLS certificate pinning, HMAC call signing, app shielding/hardening, and app attestation. Gain insights into the unique challenges of securing APIs with mobile clients, covering topics such as mobile attack surfaces, OWASP security risks, and API defense objectives. Learn about common API gateway defenses, the API proxy pattern, and techniques for protecting app packages and communication channels. Discover how to implement app-level message protection, improve run-time defenses, and authenticate apps off-device. Examine the OAuth2 authorization flow, including mobile authorization with PKCE, and understand how to strengthen it with attested app IDs. No detailed knowledge of Android, iOS, or backend server programming is required, but a basic understanding of API operations and security concepts will be beneficial. Read more

API Abuse through Mobile Apps - New Attacks, New Defenses

RSA Conference
Add to list