Mobile crowdsourcing services (MCS), enable fast and economical data acquisition at scale and find applications in a variety of domains. Prior work has shown that Foursquare and Waze (a location-based and a navigation MCS) are vulnerable to different kinds of data poisoning attacks. Such attacks can be upsetting and even dangerous especially when they are used to inject improper inputs to mislead users. However, to date, there is no comprehensive study on the extent of improper input validation (IIV) vulnerabilities and the feasibility of their exploits in MCSs across domains. In this work, we leverage the fact that MCS interface with their participants through mobile apps to design tools and new methodologies embodied in an end-to-end feedback-driven analysis framework which we use to study 10 popular and previously unexplored services in five different domains. Using our framework we send tens of thousands of API requests with automatically generated input values to characterize their IIV attack surface. Alarmingly, we found that most of them (8/10) suffer from grave IIV vulnerabilities which allow an adversary to launch data poisoning attacks at scale: 7400 spoofed API requests were successful in faking online posts for robberies, gunshots, and other dangerous incidents, faking fitness activities with supernatural speeds and distances among many others. Lastly, we discuss easy to implement and deploy mitigation strategies which can greatly reduce the IIV attack surface and argue for their use as a necessary complementary measure working toward trustworthy mobile crowdsourcing services.
翻译:在这项工作中,我们利用移动应用程序与参与者进行互动,以设计工具及新方法,这些工具及新方法体现在终端到终端反馈驱动分析框架中,我们使用这些工具来研究五个不同领域的10项广受欢迎和以前未探索的服务。我们利用我们的框架发送成千上万项API请求,并自动生成投入值,以说明其IIV攻击表面特征。令人震惊的是,我们发现,大多数此类请求(8/10)都存在严重的IIV脆弱性,从而有可能成为发动数据中毒袭击的对手:7400项向上方移动信息基础设施请求,并成功使用其他安全的在线网站。