SlideShare a Scribd company logo
Mobile
- Your API Security Blindspot
David Stewart
david.stewart@approov.io
@approov_io
www.approov.io
Agenda
● API security architecture overview
● Why is mobile special?
● Attacks against mobile platforms
● What can you do?
● Recommendations
A Typical API Architecture - Se cu rity
Source: Edge Security with an API Gateway
Note: “By 2020, more than half of all data thefts were traceable to unsecure APIs”
https://www.gartner.com/document/4009103
A Typical API Architecture - AP I Gate w ay
Note: Are all authenticated, authorized, low frequency API requests good?
Source: Edge Security with an API Gateway
New York
JULY
Australia
SEPTEMBER
Singapore
APRIL
Helsinki & North
MARCH
Paris
DECEMBER
London
OCTOBER
Jakarta
FEBRUARY
Hong Kong
AUGUST
JUNE
India
MAY
Check out our API Conferences here
50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees,
300k+ online community
Want to talk at one of our conferences?
Apply to speak here
A Typical API Architecture - W AF
Source: Edge Security with an API Gateway
Note: How do you define a known threat and who defines it?
A Typical API Architecture - Clou d Costs
Source: Edge Security with an API Gateway
Note: Why process API requests which can be identified as bad at the edge?
(Naive) View of Protecting a Mobile Channel
The User
The Service
Check user credentials and possession of a valid API key.
Username/password
OAuth2
OpenID Connect
Biometrics
WAF
API Gateway
CDN
TLS
Mobile Apps: Gifts that Keep on Giving
Downloadable and
runnable by anyone,
anytime, for any
duration and on any
platform.
Mobile APIs: Flood Gates Waiting to Open
An app limits the range/speed an
API can manipulate user data.
However, a bot can rapidly
manipulate and exfiltrate all your
valuable data.
In 2020 the average cost of a data breach is
$3.86M (Ponemon)
(Naive) View of Protecting a Mobile Channel
The User
The Service
Check user credentials and possession of a valid API key.
Username/password
OAuth2
OpenID Connect
Biometrics
WAF
API Gateway
CDN
TLS
Hackers View of a Mobile Channel (1)
The Mobile App
The User
The Service
Reverse engineering
Tampering/repackaging
Data manipulation
Hackers View of a Mobile Channel (2)
The Mobile Device
The User
The Service
Emulation/Simulation
Auto-launching
Instrumentation frameworks
Hackers View of a Mobile Channel (3)
The API Channel
The User
The Service
Person-in-the-Middle
TLS Decryption
TLS Unpinning
Scripting
Attacking the Mobile Channel
Note: The majority of these attacks are executed via scripts
(Revised) View of Protecting a Mobile Channel
Attack Surface 1:
User Credentials
Attack Surface 3:
Device Integrity
Attack Surface 2:
App Integrity
Attack Surface 4:
API Channel Integrity
Attack Surface 5:
Service Vulnerabilities
Trust nothing between user and service.
The Blindspot Revealed
What to do? Shield your surfaces.
App Integrity Checks
Under the hood:
1. Register app
2. App authenticated
3. Approov token delivered
4. Token validated
Repeat 2. every 5 minutes
https://approov.io/download/Approov-Whitepaper-Security-Trust-Gap.pdf
Device Integrity Checks
Environmental checks run at app launch and every 5 minutes during the session
Channel Integrity Checks
Dynamic Certificate Pinning:
Continuous monitoring of pins from Approov cloud and immediate notification
of changes that will cause app pinning failures
Recommendations
● App integrity:
○ Ensure *only* genuine app instances can call your API
○ https://approov.io/product/developer
● Device integrity:
○ Ensure genuine apps are running on ‘safe’ devices.
○ https://approov.io/product/security
● Channel integrity:
○ Ensure certificate pinning is implemented safely.
○ https://www.approov.io/for/mitm-webinar/watch/
● Implementation, deployment, monitoring and management:
○ Ensure visibility into your installed base and can react quickly to new threats.
○ https://blog.approov.io/a-short-tour-of-the-approov-metrics
Note: Don’t think that API
vulnerabilities are your only
problem!
Next Steps
● Check out our website Resource page:
○ https://approov.io/resource
● Use case review with API security expert (ask them anything!)
○ david.stewart@approov.io
○ https://approov.io/product/demo/
● Sign up for a free Approov trial (no credit card needed)
○ https://approov.io/signup
Approov API Threat Protection
Stop API Security Threats at the Edge
www.approov.io
https://approov.io/signup
New York
JULY
Australia
SEPTEMBER
Singapore
APRIL
Helsinki & North
MARCH
Paris
DECEMBER
London
OCTOBER
Jakarta
FEBRUARY
Hong Kong
AUGUST
JUNE
India
MAY
Check out our API Conferences here
50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees,
300k+ online community
Want to talk at one of our conferences?
Apply to speak here

More Related Content

PDF
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
PDF
apidays LIVE Paris 2021 - Synchronous Communication Patterns by Sébastien Ber...
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
apidays LIVE Paris 2021 - Taming the beast by Markus Mueller, Apiida
PDF
apidays LIVE Paris 2021 - APIGEE, different ways for integrating with CI/CD p...
PDF
apidays LIVE Paris 2021 - Advanced Authentication patterns at the Edge by Den...
PPTX
Guide to an API-first Strategy
PDF
apidays LIVE Paris 2021 - Why Can’t Us Consumers Have APIs by Salman Farmanfa...
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
apidays LIVE Paris 2021 - Synchronous Communication Patterns by Sébastien Ber...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Taming the beast by Markus Mueller, Apiida
apidays LIVE Paris 2021 - APIGEE, different ways for integrating with CI/CD p...
apidays LIVE Paris 2021 - Advanced Authentication patterns at the Edge by Den...
Guide to an API-first Strategy
apidays LIVE Paris 2021 - Why Can’t Us Consumers Have APIs by Salman Farmanfa...

What's hot (20)

PDF
apidays LIVE Paris 2021 - Beyond API Governance: Run your API org like a lean...
PPTX
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
PDF
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
PPTX
Executing on API Developer Experience
PPTX
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
PDF
apidays LIVE Paris 2021 - API design is where culture and tech meet each othe...
PPTX
API Management - Practical Enterprise Implementation Experience
PDF
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
PDF
apidays LIVE Hong Kong 2021 - Event-driven APIs & Schema governance for Apach...
PDF
apidays LIVE New York 2021 - API design is where culture and tech meet each o...
PDF
apidays LIVE Paris 2021 - Low-Code API DevOps approach to API Lifecycle Manag...
PDF
apidays LIVE Paris 2021 - Getting started with Event-Driven APis by Hugo Guer...
PDF
Building an API Security Strategy
PDF
apidays LIVE London 2021 - Advanced Authentication patterns at the Edge by De...
PDF
APIdays Paris 2019 - Adopting Service Mesh by Marco Palladino , Kong
DOCX
API Strategy in Cloud
PDF
INTERFACE, by apidays - Aligning teams and strategies behind API investment ...
PPTX
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
PDF
apidays LIVE Paris - Connectivity rules everything around us by Marco Palladino
PDF
apidays LIVE Paris 2021 - Detecting and Protecting PII by Rob Dickinson, Resu...
apidays LIVE Paris 2021 - Beyond API Governance: Run your API org like a lean...
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isb...
Executing on API Developer Experience
apidays LIVE New York 2021 - APIOps: automating API operations for speed and ...
apidays LIVE Paris 2021 - API design is where culture and tech meet each othe...
API Management - Practical Enterprise Implementation Experience
apidays LIVE London 2021 - API Security challenges and solutions by Wadii Tah...
apidays LIVE Hong Kong 2021 - Event-driven APIs & Schema governance for Apach...
apidays LIVE New York 2021 - API design is where culture and tech meet each o...
apidays LIVE Paris 2021 - Low-Code API DevOps approach to API Lifecycle Manag...
apidays LIVE Paris 2021 - Getting started with Event-Driven APis by Hugo Guer...
Building an API Security Strategy
apidays LIVE London 2021 - Advanced Authentication patterns at the Edge by De...
APIdays Paris 2019 - Adopting Service Mesh by Marco Palladino , Kong
API Strategy in Cloud
INTERFACE, by apidays - Aligning teams and strategies behind API investment ...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE Paris - Connectivity rules everything around us by Marco Palladino
apidays LIVE Paris 2021 - Detecting and Protecting PII by Rob Dickinson, Resu...
Ad

Similar to Mobile - Your API Security Blindspot by David Stewart, Approov (20)

PDF
Is Your API Being Abused – And Would You Even Notice If It Was?
PDF
SecDevOps for API Security
PPTX
apidays New York 2025 - Why an SDK is Needed to Protect APIs from Mobile Apps...
PDF
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
PDF
APIDays Paris Security Workshop
PDF
apidays New York 2023 - Putting yourself out there - how to secure your publi...
PDF
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
PDF
Enhancing your Security APIs
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
PDF
APIsecure 2023 - Enhancing API Security with Runtime Secrets & Attestation, T...
PDF
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
PDF
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
PDF
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
PDF
5 Pillars of Building Enterprise0grade APIs
PDF
The API Primer (OWASP AppSec Europe, May 2015)
PDF
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
PDF
Guidelines to protect your APIs from threats
PDF
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
PDF
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
PDF
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
Is Your API Being Abused – And Would You Even Notice If It Was?
SecDevOps for API Security
apidays New York 2025 - Why an SDK is Needed to Protect APIs from Mobile Apps...
apidays LIVE LONDON - API Abuse - Comprehension and Prevention by David Stewart
APIDays Paris Security Workshop
apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
Enhancing your Security APIs
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
APIsecure 2023 - Enhancing API Security with Runtime Secrets & Attestation, T...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - AI in API Security, Carolina Ruiz (Brier & Thorn)
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
5 Pillars of Building Enterprise0grade APIs
The API Primer (OWASP AppSec Europe, May 2015)
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
Guidelines to protect your APIs from threats
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...

Recently uploaded (20)

PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Tartificialntelligence_presentation.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
August Patch Tuesday
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
1. Introduction to Computer Programming.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Tartificialntelligence_presentation.pptx
observCloud-Native Containerability and monitoring.pptx
Zenith AI: Advanced Artificial Intelligence
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
WOOl fibre morphology and structure.pdf for textiles
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Chapter 5: Probability Theory and Statistics
Getting started with AI Agents and Multi-Agent Systems
Univ-Connecticut-ChatGPT-Presentaion.pdf
DP Operators-handbook-extract for the Mautical Institute
Final SEM Unit 1 for mit wpu at pune .pptx
Getting Started with Data Integration: FME Form 101
Web App vs Mobile App What Should You Build First.pdf
TLE Review Electricity (Electricity).pptx
August Patch Tuesday
cloud_computing_Infrastucture_as_cloud_p
Hindi spoken digit analysis for native and non-native speakers
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
1. Introduction to Computer Programming.pptx

Mobile - Your API Security Blindspot by David Stewart, Approov

  • 1. Mobile - Your API Security Blindspot David Stewart david.stewart@approov.io @approov_io www.approov.io
  • 2. Agenda ● API security architecture overview ● Why is mobile special? ● Attacks against mobile platforms ● What can you do? ● Recommendations
  • 3. A Typical API Architecture - Se cu rity Source: Edge Security with an API Gateway Note: “By 2020, more than half of all data thefts were traceable to unsecure APIs” https://www.gartner.com/document/4009103
  • 4. A Typical API Architecture - AP I Gate w ay Note: Are all authenticated, authorized, low frequency API requests good? Source: Edge Security with an API Gateway
  • 5. New York JULY Australia SEPTEMBER Singapore APRIL Helsinki & North MARCH Paris DECEMBER London OCTOBER Jakarta FEBRUARY Hong Kong AUGUST JUNE India MAY Check out our API Conferences here 50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees, 300k+ online community Want to talk at one of our conferences? Apply to speak here
  • 6. A Typical API Architecture - W AF Source: Edge Security with an API Gateway Note: How do you define a known threat and who defines it?
  • 7. A Typical API Architecture - Clou d Costs Source: Edge Security with an API Gateway Note: Why process API requests which can be identified as bad at the edge?
  • 8. (Naive) View of Protecting a Mobile Channel The User The Service Check user credentials and possession of a valid API key. Username/password OAuth2 OpenID Connect Biometrics WAF API Gateway CDN TLS
  • 9. Mobile Apps: Gifts that Keep on Giving Downloadable and runnable by anyone, anytime, for any duration and on any platform.
  • 10. Mobile APIs: Flood Gates Waiting to Open An app limits the range/speed an API can manipulate user data. However, a bot can rapidly manipulate and exfiltrate all your valuable data. In 2020 the average cost of a data breach is $3.86M (Ponemon)
  • 11. (Naive) View of Protecting a Mobile Channel The User The Service Check user credentials and possession of a valid API key. Username/password OAuth2 OpenID Connect Biometrics WAF API Gateway CDN TLS
  • 12. Hackers View of a Mobile Channel (1) The Mobile App The User The Service Reverse engineering Tampering/repackaging Data manipulation
  • 13. Hackers View of a Mobile Channel (2) The Mobile Device The User The Service Emulation/Simulation Auto-launching Instrumentation frameworks
  • 14. Hackers View of a Mobile Channel (3) The API Channel The User The Service Person-in-the-Middle TLS Decryption TLS Unpinning Scripting
  • 15. Attacking the Mobile Channel Note: The majority of these attacks are executed via scripts
  • 16. (Revised) View of Protecting a Mobile Channel Attack Surface 1: User Credentials Attack Surface 3: Device Integrity Attack Surface 2: App Integrity Attack Surface 4: API Channel Integrity Attack Surface 5: Service Vulnerabilities Trust nothing between user and service.
  • 17. The Blindspot Revealed What to do? Shield your surfaces.
  • 18. App Integrity Checks Under the hood: 1. Register app 2. App authenticated 3. Approov token delivered 4. Token validated Repeat 2. every 5 minutes https://approov.io/download/Approov-Whitepaper-Security-Trust-Gap.pdf
  • 19. Device Integrity Checks Environmental checks run at app launch and every 5 minutes during the session
  • 20. Channel Integrity Checks Dynamic Certificate Pinning: Continuous monitoring of pins from Approov cloud and immediate notification of changes that will cause app pinning failures
  • 21. Recommendations ● App integrity: ○ Ensure *only* genuine app instances can call your API ○ https://approov.io/product/developer ● Device integrity: ○ Ensure genuine apps are running on ‘safe’ devices. ○ https://approov.io/product/security ● Channel integrity: ○ Ensure certificate pinning is implemented safely. ○ https://www.approov.io/for/mitm-webinar/watch/ ● Implementation, deployment, monitoring and management: ○ Ensure visibility into your installed base and can react quickly to new threats. ○ https://blog.approov.io/a-short-tour-of-the-approov-metrics Note: Don’t think that API vulnerabilities are your only problem!
  • 22. Next Steps ● Check out our website Resource page: ○ https://approov.io/resource ● Use case review with API security expert (ask them anything!) ○ david.stewart@approov.io ○ https://approov.io/product/demo/ ● Sign up for a free Approov trial (no credit card needed) ○ https://approov.io/signup
  • 23. Approov API Threat Protection Stop API Security Threats at the Edge www.approov.io https://approov.io/signup
  • 24. New York JULY Australia SEPTEMBER Singapore APRIL Helsinki & North MARCH Paris DECEMBER London OCTOBER Jakarta FEBRUARY Hong Kong AUGUST JUNE India MAY Check out our API Conferences here 50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees, 300k+ online community Want to talk at one of our conferences? Apply to speak here