Presentation is loading. Please wait.

Presentation is loading. Please wait.

Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks Shehroze Farooqi1, Fareed Zaffar2, Nektarios Leontiadis3, Zubair Shafiq1 University.

Similar presentations


Presentation on theme: "Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks Shehroze Farooqi1, Fareed Zaffar2, Nektarios Leontiadis3, Zubair Shafiq1 University."— Presentation transcript:

1 Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks
Shehroze Farooqi1, Fareed Zaffar2, Nektarios Leontiadis3, Zubair Shafiq1 University of Iowa1, Lahore University of Management Sciences2, Facebook3 Shehroze Farooqi

2 Key Contributions Security Issue Measurement Countermeasures
OAuth access token leakage Measurement Abuse of leaked access tokens by collusion networks Countermeasures Mitigation of access token abuse Shehroze Farooqi

3 Outline Security Issue Measurement Countermeasures
OAuth access token leakage Measurement Abuse of leaked access tokens Countermeasures Mitigation of access token abuse Shehroze Farooqi

4 Third-party applications
OAuth Authorization framework OAuth 2.0 [RFC 6749] Enable third-party applications to get restricted access to online services Online services Third-party applications Shehroze Farooqi

5 Single Sign On (SSO) Shehroze Farooqi

6 Access Token An opaque string
Represents authorization issued to the third-party application Provides an alternate of sharing username/password EAACEdEose0cBAAP8fZCGOTmVi5wZAW4pUfZCf1cEEQaCAWEP7AOFqZCVOlesGdVI1ubVYcnbmU59FZAJsjMV65LFxzyVo Shehroze Farooqi

7 OAuth Workflow of Facebook Applications
Server-side flow Client-side flow Shehroze Farooqi

8 OAuth Workflow of Facebook Applications
Server-side flow Client-side flow Shehroze Farooqi

9 OAuth Workflow of Facebook Applications
Server-side flow Client-side flow Shehroze Farooqi

10 Client-side Flow Benefits of the client-side flow
Provides support for the applications without server Cross-platform interoperability Used by many browser-based applications such as games Security issues with client-side flow Applications are susceptible to access token leakage [RFC 6819] Focus on the applications susceptible to access token leakage Shehroze Farooqi

11 Identification of Susceptible Applications
Scanned 100 most popular applications Identified 9 susceptible applications Application name Monthly active users rank Spotify 4 PlayStation Network 57 Deezer 59 Pandora 68 HTC Sense 75 Top 5 susceptible applications Shehroze Farooqi

12 Implications of leaked access tokens
Passive: Steal personal information , location, birth date, work history Active: Conduct malicious activities Spread malware Reputation manipulation e.g., fake likes, fake comments Shehroze Farooqi

13 Outline Security Issue Measurement Countermeasures
OAuth access token leakage Measurement Abuse of leaked access tokens Countermeasures Mitigation of access token abuse Shehroze Farooqi

14 Collusion Networks Users deliberately submit access tokens
In exchange get likes and comments Large scale abuse of leaked access tokens Fake likes, fake comments Exploit top applications with millions of active users E.g., HTC Sense (1 million monthly active users) Identified 50 collusion network websites E.g., hublaa.me, official-liker.net Shehroze Farooqi

15 Install Application Retrieve Access Token Submit Access Token
Shehroze Farooqi

16 Milking Collusion Networks
Deployed honeypot accounts to milk collusion networks Create a dummy post on Facebook Join a collusion network by submitting the access token Regularly submit posts to get likes and comments Automated the process for all collusion networks Shehroze Farooqi

17 Milking Process Steady increase in likes count
Repetition of unique users Diminishing returns f8-autoliker.com Shehroze Farooqi

18 Summary of collected data
Submitted 11K+ posts Received 2.7 Million likes Identified over a million members Collusion network Number of Posts Submitted Number of Likes Membership Size Official-liker.net 1,757 685,88 233,161 Hublaa.me 1,421 496,714 294,949 F8-autolikers.com 1,311 331,923 72,157 All 11,751 2,753,153 1,150,782 Top 3 Collusion Networks Shehroze Farooqi

19 Outline Security Issue Measurement Countermeasures
OAuth access token leakage Measurement Abuse of leaked access tokens Countermeasures Mitigation of access token abuse Shehroze Farooqi

20 Challenges in Proposing Countermeasures
Block susceptible applications Impact legitimate users Disable the client-side flow Applications without server Platform usability False positives Detection accuracy Shehroze Farooqi

21 Proposed Countermeasures
Access token rate limits Honeypot based access token invalidation Temporal clustering IP rate limits Shehroze Farooqi

22 Impact of Countermeasures
Experimental Setup Shehroze Farooqi

23 Impact of Countermeasures
Establishing baseline Shehroze Farooqi

24 Impact of Countermeasures
Reduction in access token rate limit Shehroze Farooqi

25 Impact of Countermeasures
Access token invalidation – Half of all tokens Shehroze Farooqi

26 Impact of Countermeasures
Access token invalidation – All tokens Shehroze Farooqi

27 Impact of Countermeasures
Access token invalidation – Half of new tokens daily Shehroze Farooqi

28 Impact of Countermeasures
Access token invalidation – All new tokens daily Shehroze Farooqi

29 Impact of Countermeasures
Clustering based access token invalidation Shehroze Farooqi

30 Impact of Countermeasures
IP address rate limits Shehroze Farooqi

31 Key Takeaways Countermeasures Security issues in OAuth
Arms race – Proven to be long lasting Robustness Security issues in OAuth Similar access token leakage and abuse on other online services Investigate other OAuth security flaws and potential attacks Shehroze Farooqi

32 Questions? Email: shehroze-farooqi@uiowa.edu
Webpage: Questions? Shehroze Farooqi


Download ppt "Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks Shehroze Farooqi1, Fareed Zaffar2, Nektarios Leontiadis3, Zubair Shafiq1 University."

Similar presentations


Ads by Google