By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
ScienceabodeScienceabode
  • Home
  • News & Perspective
    News & PerspectiveShow More
    Microorganism that causes rare but severe eye infections detected in NSW coastal areas
    By Admin
    Scientists identify common cause of gastro in young children and adults over 50 years old
    By admin
    AI reveals hidden traits about our planet’s flora to help save species
    By admin
    Eye drops slow nearsightedness progression in kids, study finds
    By admin
    Using AI to create better, more potent medicines
    By admin
  • Latest News
    Latest NewsShow More
    Researchers develop new robot medics for places doctors are unable to be
    By Admin
    Even thinking about marriage gets young people to straighten up
    By admin
    Study: People tend to locate the self in the brain or the heart – and it affects their judgments and decisions
    By admin
    UCLA patient is first to receive successful heart transplant after using experimental 50cc Total Artificial Heart
    By admin
    Via Dying Cells, UVA Finds Potential Way to Control Cholesterol Levels
    By admin
  • Health
    Health
    The World Health Organization defines health as “a state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity.”…
    Show More
    Top News
    Tiny magnetic discs offer remote brain stimulation without transgenes
    October 18, 2024
    World’s largest study of brain volume reveals genetic links to ADHD, Parkinson’s Disease 
    October 26, 2024
    Hoarding disorder: ‘sensory CBT’ treatment strategy shows promise
    October 18, 2024
    Latest News
    How do therapy dogs help domestic abuse survivors receiving support services?
    May 10, 2025
    New chronic pain therapy retrains the brain to process emotions
    May 10, 2025
    Mind Blank? Here’s What Your Brain Is Really Doing During Those Empty Moments
    May 7, 2025
    A Common Diabetes Drug Might Be the Secret to Relieving Knee Pain Without Surgery!
    April 28, 2025
  • Environment
    EnvironmentShow More
    Arsenic exposure linked to faster onset of diabetes in south Texas population 
    By Admin
    Antarctica vulnerable to invasive species hitching rides on plastic and organic debris
    By Admin
    New substrate material for flexible electronics could help combat e-waste
    By Admin
    Bacteria ‘nanowires’ could help scientists develop green electronics
    By Admin
    Replacing plastics with alternatives is worse for greenhouse gas emissions in most cases, study finds
    By Admin
  • Infomation
    • Pricavy Policy
    • Terms of Service
  • Jobs
  • Application Submission
Notification Show More
Aa
ScienceabodeScienceabode
Aa
  • Home
  • Health
  • Anatomy
  • Jobs Portal
  • Application Submission
  • Categories
    • Health
    • Anatomy
    • Food & Diet
    • Beauty Lab
    • News & Perspective
    • Environment
  • More Foxiz
    • Blog Index
    • Sitemap
Follow US
Scienceabode > Blog > Uncategorized > Smartphone Apps May Connect to Vulnerable Backend Cloud Servers
Uncategorized

Smartphone Apps May Connect to Vulnerable Backend Cloud Servers

admin
Last updated: 2019/09/09 at 4:22 PM
By admin
Share
8 Min Read
SHARE

Cybersecurity researchers have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don’t even know exists.

In research to be reported August 15 at the 2019 USENIX Security Symposium, researchers from the Georgia Institute of Technology and The Ohio State University identified more than 1,600 vulnerabilities in the support ecosystem behind the top 5,000 free apps available in the Google Play Store. The vulnerabilities, affecting multiple app categories, could allow hackers to break into databases that include personal information – and perhaps into users’ mobile devices.

To help developers improve the security of their mobile apps, the researchers have created an automated system called SkyWalker to vet the cloud servers and software library systems. SkyWalker can examine the security of the servers supporting mobile applications, which are often operated by cloud hosting services rather than individual app developers.

- Advertisement -
MedBanner_Skyscraper_160x600_03/2018

“A lot of people might be surprised to learn that their phone apps are communicating with not just one, but likely tens or even hundreds of servers in the cloud,” said Brendan Saltaformaggio, an assistant professor in Georgia Tech’s School of Electrical and Computer Engineering. “Users don’t know they are communicating with these servers because only the apps interact with them and they do so in the background. Until now, that has been a blind spot where nobody was looking for vulnerabilities.”

The Air Force Office of Scientific Research and the National Science Foundation supported the research.

In their study, the researchers discovered 983 instances of known vulnerabilities and another 655 instances of zero-day vulnerabilities spanning across the software layers – operating systems, software services, communications modules and web apps – of the cloud-based systems supporting the apps. The researchers are still investigating whether attackers could get into individual mobile devices connected to vulnerable servers.

“These vulnerabilities affect the servers that are in the cloud, and once an attacker gets on the server, there are many ways they can attack,” Saltaformaggio said. “It’s a whole new question whether or not they can jump from the server to a user’s device, but our preliminary research on that is very concerning.”

The researchers identified three types of attack that could be made on the backend servers: SQL injection, XML external entity and cross-site scripting, explained Omar Alrawi, a Georgia Tech graduate research assistant and co-first author with Chaoshun Zuo at Ohio State. By taking control of these machines in the cloud, attackers could gain access to personal data, delete or alter information or even redirect financial transactions to deposit funds in their own accounts.

To study the system, Alrawi and Zuo ran applications in a controlled environment on a mobile device that connected to backend servers. They then watched the communications between the device and servers, and repeated the process for all of the applications studied.

“We found that a lot of applications don’t encrypt the communications between the mobile app and the cloud service, so an attacker that is between the two points or on the same network as the mobile could get information about the user – their location and user name – and potentially execute password resets,” Alrawi said.

The vulnerabilities were not easy to spot. “You have to understand the context through which the app communicates with the cloud server,” he said. “These are very deep bugs that cannot be identified by simply scanning and using traditional tools that are used for web application security.”

The operators of vulnerable systems were notified of the findings. Concerns about who is responsible for securing those backend servers is one of the issues to come out of the study.

“It’s actually a significant problem because of how many different software developers may have their hands in building these cloud servers,” Saltaformaggio said. “It’s not always clear who is responsible for doing the patching and who is responsible for the vulnerabilities. It’s tough to track down these vulnerabilities, but it’s also tough to get them patched.”

To save app developers from having to do the security research they did, the researchers are offering SkyWalker, an analysis pipeline to study mobile backends. Developers will be able to submit their apps to SkyWalker at https://mobilebackend.vet and get a report on what it finds.

“SkyWalker will watch how the application communicates with those cloud servers, and then it will try to communicate with the servers to find vulnerabilities,” said Alrawi. “This information can give an app developer a heads-up about potential problems before they make their application public.”

The researchers studied only applications in the Google Play Store. But applications designed for iOS may share the same backend systems.

“These servers provide backend services for mobile apps that any device could use,” Alrawi said. “These cloud services are essential components of modern mobile apps. They are part of the always-connected world.”

For the future, the researchers hope to study how the vulnerabilities could affect smartphone users, and to check on whether the problems they identified have been addressed.

“We are going to keep doing these sorts of studies and will revisit them later to see how the attack landscape has improved,” said Saltaformaggio. “We will keep looking for more blind spots that need to be studied. In the new world of smartphones and mobile applications, there are unique problems that need to be rooted out.”

In addition to those already mentioned, the research team included Ruian Duan and Ranjita Pai Kasturi from Georgia Tech and Zhiqiang Lin from Ohio State.

This work was partially supported by the Air Force Office of Scientific Research (AFOSR) under grant FA9550-14-1-0119 and by National Science Foundation (NSF) awards 1834215 and 1834216. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsoring organizations.

CITATION: Omar Alrawi, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin and Brendan Saltaformaggio, “The Betrayal at Cloud City: An Empirical Analysis of Cloud-Based Mobile Backends,” 2019 USENIX Security Symposium.

Source: Georgia Institute of Technology.

Published on September 9, 2019

admin September 9, 2019 September 9, 2019
Share This Article
Facebook Twitter Copy Link Print

Fast Four Quiz: Precision Medicine in Cancer

How much do you know about precision medicine in cancer? Test your knowledge with this quick quiz.
Get Started
Even in Winter, Life Persists in Arctic Seas

(USCGC Healy breaking through the Bering Sea waves. Credit: Chantelle Rose/NSF)   Despite…

A Biodiversity Discovery That Was Waiting in the Wings–Wasp Wings, That Is

Wing size differences between two Nasonia wasp species are the result of…

Entertainement

Coming soon

Your one-stop resource for medical news and education.

Your one-stop resource for medical news and education.
Sign Up for Free

You Might Also Like

Uncategorized

Microorganism that causes rare but severe eye infections detected in NSW coastal areas

By Admin
Uncategorized

Scientists identify common cause of gastro in young children and adults over 50 years old

By admin
Uncategorized

AI reveals hidden traits about our planet’s flora to help save species

By admin
Uncategorized

Eye drops slow nearsightedness progression in kids, study finds

By admin
Facebook Twitter Youtube Instagram
Company
  • Privacy Policy
  • Editorial Policy
  • Accessibility Statement
  • Contact US
  • Feedback
  • Advertisement
More Info
  • Newsletter
  • Beauty Lab
  • News & Perspective
  • Food & Diet
  • Health
  • Environment
  • Anatomy

Sign Up For Free

Subscribe to our newsletter and don't miss out on our programs, webinars and trainings.

Copyright © 2023 ScienceAbode. All Rights Reserved. Designed and Developed by Spirelab Solutions (Pvt) Ltd

Welcome Back!

Sign in to your account

Lost your password?