File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis

TitleDevils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Authors
Issue Date2019
Citation
Proceedings of the 28th USENIX Security Symposium, 2019, p. 747-764 How to Cite?
AbstractFinding logic flaws today relies on the program analysis that leverages the functionality information reported in the program's documentation. Our research, however, shows that the documentation alone may already contain information for predicting the presence of some logic flaws, even before the code is analyzed. Our first step on this direction focuses on emerging syndication services that facilitate integration of multiple payment services (e.g., Alipay, Wechat Pay, PayPal, etc.) into merchant systems. We look at whether a syndication service will cause some security requirements (e.g., checking payment against price) to become unenforceable due to losing visibility of some key parameters (e.g., payment, price) to the parties involved in the syndication, or bring in implementation errors when required security checks fail to be communicated to the developer. For this purpose, we developed a suite of Natural Language Processing techniques that enables automatic inspection of the syndication developer's guide, based upon the payment models and security requirements from the payment service. Our approach is found to be effective in identifying these potential problems from the guide, and leads to the discovery of 5 new security-critical flaws in popular Chinese merchant systems that can cause circumvention of payment once exploited.
Persistent Identifierhttp://hdl.handle.net/10722/350221

 

DC FieldValueLanguage
dc.contributor.authorChen, Yi-
dc.contributor.authorXing, Luyi-
dc.contributor.authorQin, Yue-
dc.contributor.authorLiao, Xiaojing-
dc.contributor.authorWang, Xiao Feng-
dc.contributor.authorChen, Kai-
dc.contributor.authorZou, Wei-
dc.date.accessioned2024-10-21T04:35:09Z-
dc.date.available2024-10-21T04:35:09Z-
dc.date.issued2019-
dc.identifier.citationProceedings of the 28th USENIX Security Symposium, 2019, p. 747-764-
dc.identifier.urihttp://hdl.handle.net/10722/350221-
dc.description.abstractFinding logic flaws today relies on the program analysis that leverages the functionality information reported in the program's documentation. Our research, however, shows that the documentation alone may already contain information for predicting the presence of some logic flaws, even before the code is analyzed. Our first step on this direction focuses on emerging syndication services that facilitate integration of multiple payment services (e.g., Alipay, Wechat Pay, PayPal, etc.) into merchant systems. We look at whether a syndication service will cause some security requirements (e.g., checking payment against price) to become unenforceable due to losing visibility of some key parameters (e.g., payment, price) to the parties involved in the syndication, or bring in implementation errors when required security checks fail to be communicated to the developer. For this purpose, we developed a suite of Natural Language Processing techniques that enables automatic inspection of the syndication developer's guide, based upon the payment models and security requirements from the payment service. Our approach is found to be effective in identifying these potential problems from the guide, and leads to the discovery of 5 new security-critical flaws in popular Chinese merchant systems that can cause circumvention of payment once exploited.-
dc.languageeng-
dc.relation.ispartofProceedings of the 28th USENIX Security Symposium-
dc.titleDevils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-85076358557-
dc.identifier.spage747-
dc.identifier.epage764-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats