论文标题
业务协作平台中应用模型的实验安全分析
Experimental Security Analysis of the App Model in Business Collaboration Platforms
论文作者
论文摘要
Microsoft团队和Slack等业务协作平台通过支持文本聊天和第三方资源集成来启用团队工作。用户可以从平台内访问在线文件存储,进行视频呼叫并管理代码存储库,从而使其成为敏感通信和资源的枢纽。这些生产力特征的关键推动因素是第三方应用程序模型。我们对该模型和第三方应用程序进行了实验安全分析。执行此分析是具有挑战性的,因为商业平台及其应用程序是封闭消息系统。我们的分析方法是系统地研究应用程序和用户之间可能的不同类型的交互。我们发现,这些系统中的访问控制模型违反了两个基本安全原则:最低特权和完整的调解。这些违规行为使恶意应用程序可以利用用户消息的机密性和完整性以及连接到平台的第三方资源的保密性和完整性。我们构建了可以:(1)在无权阅读这些消息的情况下窃听用户消息的概念验证攻击; (2)启动假视频通话; (3)无需用户批准或参与即可自动将代码合并到存储库中。最后,我们对Slack和Microsoft团队等系统可以采用的对策进行分析。
Business Collaboration Platforms like Microsoft Teams and Slack enable teamwork by supporting text chatting and third-party resource integration. A user can access online file storage, make video calls, and manage a code repository, all from within the platform, thus making them a hub for sensitive communication and resources. The key enabler for these productivity features is a third-party application model. We contribute an experimental security analysis of this model and the third-party apps. Performing this analysis is challenging because commercial platforms and their apps are closed-source systems. Our analysis methodology is to systematically investigate different types of interactions possible between apps and users. We discover that the access control model in these systems violates two fundamental security principles: least privilege and complete mediation. These violations enable a malicious app to exploit the confidentiality and integrity of user messages and third-party resources connected to the platform. We construct proof-of-concept attacks that can: (1) eavesdrop on user messages without having permission to read those messages; (2) launch fake video calls; (3) automatically merge code into repositories without user approval or involvement. Finally, we provide an analysis of countermeasures that systems like Slack and Microsoft Teams can adopt today.