File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Title | Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis |
---|---|
Authors | |
Issue Date | 2019 |
Citation | Proceedings of the 28th USENIX Security Symposium, 2019, p. 747-764 How to Cite? |
Abstract | Finding logic flaws today relies on the program analysis that leverages the functionality information reported in the program's documentation. Our research, however, shows that the documentation alone may already contain information for predicting the presence of some logic flaws, even before the code is analyzed. Our first step on this direction focuses on emerging syndication services that facilitate integration of multiple payment services (e.g., Alipay, Wechat Pay, PayPal, etc.) into merchant systems. We look at whether a syndication service will cause some security requirements (e.g., checking payment against price) to become unenforceable due to losing visibility of some key parameters (e.g., payment, price) to the parties involved in the syndication, or bring in implementation errors when required security checks fail to be communicated to the developer. For this purpose, we developed a suite of Natural Language Processing techniques that enables automatic inspection of the syndication developer's guide, based upon the payment models and security requirements from the payment service. Our approach is found to be effective in identifying these potential problems from the guide, and leads to the discovery of 5 new security-critical flaws in popular Chinese merchant systems that can cause circumvention of payment once exploited. |
Persistent Identifier | http://hdl.handle.net/10722/350221 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Yi | - |
dc.contributor.author | Xing, Luyi | - |
dc.contributor.author | Qin, Yue | - |
dc.contributor.author | Liao, Xiaojing | - |
dc.contributor.author | Wang, Xiao Feng | - |
dc.contributor.author | Chen, Kai | - |
dc.contributor.author | Zou, Wei | - |
dc.date.accessioned | 2024-10-21T04:35:09Z | - |
dc.date.available | 2024-10-21T04:35:09Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Proceedings of the 28th USENIX Security Symposium, 2019, p. 747-764 | - |
dc.identifier.uri | http://hdl.handle.net/10722/350221 | - |
dc.description.abstract | Finding logic flaws today relies on the program analysis that leverages the functionality information reported in the program's documentation. Our research, however, shows that the documentation alone may already contain information for predicting the presence of some logic flaws, even before the code is analyzed. Our first step on this direction focuses on emerging syndication services that facilitate integration of multiple payment services (e.g., Alipay, Wechat Pay, PayPal, etc.) into merchant systems. We look at whether a syndication service will cause some security requirements (e.g., checking payment against price) to become unenforceable due to losing visibility of some key parameters (e.g., payment, price) to the parties involved in the syndication, or bring in implementation errors when required security checks fail to be communicated to the developer. For this purpose, we developed a suite of Natural Language Processing techniques that enables automatic inspection of the syndication developer's guide, based upon the payment models and security requirements from the payment service. Our approach is found to be effective in identifying these potential problems from the guide, and leads to the discovery of 5 new security-critical flaws in popular Chinese merchant systems that can cause circumvention of payment once exploited. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 28th USENIX Security Symposium | - |
dc.title | Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-85076358557 | - |
dc.identifier.spage | 747 | - |
dc.identifier.epage | 764 | - |