How Easily Attackers Can Fake Requests to Your Server - And What You Can Do Against It
Start speaking a new language. It’s just 3 weeks away.
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how attackers can manipulate requests to your server and discover effective countermeasures through app attestation in this 19-minute tutorial. Explore real-world examples of security vulnerabilities and understand how malicious actors can fake client requests to compromise server integrity. Examine a practical implementation of app attestation to verify client device authenticity and prevent request manipulation. Dive into the technical mechanics of how app attestation works under the hood, including cryptographic verification processes and security protocols. Review Guardsquare's web dashboard interface and monitoring capabilities for threat detection. Compare Play Integrity API with Guardsquare's app attestation solution, analyzing their respective strengths and use cases. Determine which types of applications should prioritize implementing app attestation based on security requirements and threat models.
Syllabus
00:00 - What is app attestation?
00:46 - Real-world examples
4:18 - Practical example for app attestation
8:07 - How it works technically
12:15 - Guardsquare web dashboard
15:28 - Play Integrity vs. Guardsquare
16:47 - Which apps should stick to it?
Taught by
Philipp Lackner