Detecting Vulnerable OAuth 2.0 Implementations in Android Applications

dc.contributor.authorDamkham W.
dc.contributor.authorKunihiro S.
dc.contributor.authorTeerakanok S.
dc.contributor.authorUehara T.
dc.contributor.correspondenceDamkham W.
dc.contributor.otherMahidol University
dc.date.accessioned2024-03-13T18:22:39Z
dc.date.available2024-03-13T18:22:39Z
dc.date.issued2023-01-01
dc.description.abstractOAuth 2.0, a prevalent authorization framework, can be vulnerable to cross-site request forgery (CSRF) attacks, thus requiring developers' due diligence during implementation in Android applications. A key countermeasure includes a state parameter in the URL during the login transition. However, lacking state parameter doesn't necessarily imply an inherent vulnerability to CSRF attacks. To investigate this further, we developed an Android application to analyse other Android applications using OAuth 2.0 with Google accounts, focusing primarily on the utilisation of the state parameter in CSRF attack prevention. Our investigation involves assessing the login procedures of applications via both the Chrome application and the default browser. Through this, we aim to identify the presence or absence of the state parameter and the authorization code, critical components in a robust CSRF defence strategy. Our findings allow us to evaluate if Android applications using OAuth 2.0 have basic protections against CSRF attacks. The results of our research could protect users by identifying and discouraging the use of Android applications that employ OAuth 2.0 for social login yet remain vulnerable to CSRF attacks.
dc.identifier.citationProceedings - 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion, QRS-C 2023 (2023) , 524-531
dc.identifier.doi10.1109/QRS-C60940.2023.00024
dc.identifier.scopus2-s2.0-85186744083
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/97559
dc.rights.holderSCOPUS
dc.subjectComputer Science
dc.subjectEngineering
dc.titleDetecting Vulnerable OAuth 2.0 Implementations in Android Applications
dc.typeConference Paper
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85186744083&origin=inward
oaire.citation.endPage531
oaire.citation.startPage524
oaire.citation.titleProceedings - 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security Companion, QRS-C 2023
oairecerif.author.affiliationRitsumeikan University Biwako-Kusatsu Campus
oairecerif.author.affiliationMahidol University

Files

Collections