• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Engineering Experiment Station

  • About
    • National Center of Academic Excellence Designations
    • External Advisory Board
    • Our Team
    • Contact Us
  • Research
  • Education
    • Student’s Corner
    • Faculty
    • Graduate Curriculum
    • Available Scholarships
    • GenCyber Summer Camps
    • Pathways
    • Texas A&M Cyber Leader Development Program
    • VICEROY
    • Online Course Offerings
      • CompTIA Network+ Certification Preparation (plus voucher)
      • CompTIA Pentest+ Certification Preparation (plus voucher)
      • CompTIA Security+ Certification Preparation (plus voucher)
      • CompTIA CySA+ Preparation Course (CS0-003) (plus Voucher)
  • News
    • TAMUctf
    • TAMUctf – Cyber Wise
  • Facilities
    • Texas Cyber Range (TxCR)
    • Texas SCADA Testbed

Texas A&M professor researching mobile applications security

July 25, 2018

By: Deana Totzke

Smartphones, tablets, iPads – mobile devices have become invaluable to the everyday consumer. But few consider the security issues that occur when using these devices.

Modern mobile applications or “apps” use cloud-hosted HTTP-based application programming interface (API) services and heavily rely on the internet infrastructure for data communication and storage. To improve performance and leverage the power of the mobile device, input validation and other business logic required for interfacing with web API services are typically implemented on the mobile client. However, when a web service implementation fails to thoroughly replicate input validation, it gives rise to inconsistencies that could lead to attacks that can compromise user security and privacy. Developing automatic methods of auditing web APIs for security remains challenging.

Dr. Guofei Gu, associate professor in the Department of Computer Science and Engineering at Texas A&M University and director of the SUCCESS lab, together with his doctoral students Abner Mendoza and Guangliang Yang, are working to combat these security issues.

Gu and his team analyzed 10,000 mobile apps and found that many of them are open to web API hijacking – something that potentially affects the privacy and security of tens of millions of business users and consumers globally.

The root of the threat lies in the inconsistencies that are often found between app and server logic in web API implementations for mobile apps. Gu’s team created the WARDroid framework to crawl applications, automatically carrying out reconnaissance and uncovering these kinds of inconsistencies, using static analysis along with what kinds of HTTP requests are accepted by the server. Once an attacker has the information on what these requests look like, he or she can carry out their own actions by tweaking a few parameters.

As a simple example, Gu explains in a vulnerable shopping app/server, a malicious user could shop for free by making some of the item prices in the shopping cart as negative (with tweaking some HTTP parameters), which should not be allowed by the app but unfortunately can be accepted by the server.

After identifying many vulnerable real-world mobile apps/servers that affect millions of users, Gu’s team has communicated with the developers to help them fix the vulnerabilities. This research has already generated real-world impacts. Their research paper was published in proceedings of the 2018 Institute of Electrical and Electronics Engineers (IEEE) Symposium on Security & Privacy (S&P’18), one of the most prestigious top conferences in cybersecurity with an acceptance rate lower than 12 percent. This work has also been reported in several media outlets, including BLEEPINGCOMPUTER, ThreatPost and SecurityBoulevard, and also generated extensive discussion on the popular technology social news website Slashdot.

This is just one example of Gu’s research on mobile app security. At the same conference Gu’s team had another research paper on mobile app security that identifies a new type of vulnerability named Origin Stripping Vulnerabilities (OSV) in modern hybrid mobile apps and introduces a new mitigation solution OSV-Free (which is released as open source at http://success.cse.tamu.edu/lab/osv-free.php). For more details on Gu’s research on mobile security, please visit his lab’s website.

Gu’s innovations in network security technology were recently recognized with a College of Engineering Research Impact Award.  

Source: https://tees.tamu.edu/news/2018/07/12/texas-am-professor-researching-mobile-applications-security/

Filed Under: News

Texas A&M Cybersecurity Center

email: [email protected]

200 Discovery Drive, Suite 117
4254 TAMU
College Station, TX 77843-4252

Contact Us

Connect

link: TAMU Cybersecurity Center Facebook  link: TAMU Cyber Security Twitter  link: TAMU Cybersecurity Center LinkedIn page

Texas A&M IT Security Policy and Compliance 

  • Accessibility
  • State Links and Policies
  • Privacy Policy
  • Website Feedback
  • Texas A&M University

Copyright © 2025 · Texas A&M Engineering Experiment Station · All Rights Reserved