Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services

10/16/2021
by   Sojhal Ismail Khan, et al.
0

Mobile crowdsourcing services (MCS), enable fast and economical data acquisition at scale and find applications in a variety of domains. Prior work has shown that Foursquare and Waze (a location-based and a navigation MCS) are vulnerable to different kinds of data poisoning attacks. Such attacks can be upsetting and even dangerous especially when they are used to inject improper inputs to mislead users. However, to date, there is no comprehensive study on the extent of improper input validation (IIV) vulnerabilities and the feasibility of their exploits in MCSs across domains. In this work, we leverage the fact that MCS interface with their participants through mobile apps to design tools and new methodologies embodied in an end-to-end feedback-driven analysis framework which we use to study 10 popular and previously unexplored services in five different domains. Using our framework we send tens of thousands of API requests with automatically generated input values to characterize their IIV attack surface. Alarmingly, we found that most of them (8/10) suffer from grave IIV vulnerabilities which allow an adversary to launch data poisoning attacks at scale: 7400 spoofed API requests were successful in faking online posts for robberies, gunshots, and other dangerous incidents, faking fitness activities with supernatural speeds and distances among many others. Lastly, we discuss easy to implement and deploy mitigation strategies which can greatly reduce the IIV attack surface and argue for their use as a necessary complementary measure working toward trustworthy mobile crowdsourcing services.

READ FULL TEXT
research
03/03/2023

Exploiting Input Sanitization for Regex Denial of Service

Web services use server-side input sanitization to guard against harmful...
research
09/09/2019

Lessons Learned from Developing a Microservice Based Mobile Location-Based Crowdsourcing Platform

Research in Mobile Location-Based Crowdsourcing is hindered by a marked ...
research
12/20/2021

Deriving Semantics-Aware Fuzzers from Web API Schemas

Fuzzing – whether generating or mutating inputs – has found many bugs an...
research
11/19/2022

Investigating the Security of EV Charging Mobile Applications As an Attack Surface

The adoption rate of EVs has witnessed a significant increase in recent ...
research
09/29/2022

TruEyes: Utilizing Microtasks in Mobile Apps for Crowdsourced Labeling of Machine Learning Datasets

The growing use of supervised machine learning in research and industry ...
research
12/14/2020

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services

Smart DNS (SDNS) services advertise access to "geofenced" content (typic...
research
11/20/2021

You Overtrust Your Printer

Printers are common devices whose networked use is vastly unsecured, per...

Please sign up or login with your details

Forgot password? Click here to reset