YoVDO

Ways to Die in Mobile OAuth

Offered By: Black Hat via YouTube

Tags

Black Hat Courses OAuth Courses Authorization Courses Security Vulnerabilities Courses

Course Description

Overview

Explore the security vulnerabilities in OAuth implementation for mobile applications in this 47-minute Black Hat conference talk. Delve into an in-depth study that demystifies OAuth for mobile app developers, combining protocol documentation analysis and a field study of over 600 popular mobile apps. Discover alarming findings revealing that 59.7% of OAuth-using applications were incorrectly implemented and vulnerable. Examine key security-critical portions of OAuth protocol flows that confuse mobile developers, and learn from real-world examples of implementation pitfalls. Gain valuable insights into improving OAuth usage in mobile applications, based on lessons learned from communicating with vendors of vulnerable apps. Understand the challenges of repurposing and re-targeting OAuth from its original web-based authorization purpose to mobile platforms and authentication use cases.

Syllabus

1000 Ways to Die in Mobile Oauth


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube