Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Easily Attackers Can Fake Requests to Your Server - And What You Can Do Against It

Philipp Lackner via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how attackers can manipulate requests to your server and discover effective countermeasures through app attestation in this 19-minute tutorial. Explore real-world examples of security vulnerabilities and understand how malicious actors can fake client requests to compromise server integrity. Examine a practical implementation of app attestation to verify client device authenticity and prevent request manipulation. Dive into the technical mechanics of how app attestation works under the hood, including cryptographic verification processes and security protocols. Review Guardsquare's web dashboard interface and monitoring capabilities for threat detection. Compare Play Integrity API with Guardsquare's app attestation solution, analyzing their respective strengths and use cases. Determine which types of applications should prioritize implementing app attestation based on security requirements and threat models.

Syllabus

00:00 - What is app attestation?
00:46 - Real-world examples
4:18 - Practical example for app attestation
8:07 - How it works technically
12:15 - Guardsquare web dashboard
15:28 - Play Integrity vs. Guardsquare
16:47 - Which apps should stick to it?

Taught by

Philipp Lackner

Reviews

Start your review of How Easily Attackers Can Fake Requests to Your Server - And What You Can Do Against It

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.