Abusing the Rules: Detect and Defend Against Business Logic Attacks in APIs

Business logic vulnerabilities in APIs are often design oversights that lead to dangerous outcomes. They occur when attackers abuse legitimate API behavior to bypass controls or exploit workflows. In this talk, we’ll share field experience developing behavioral analysis techniques that surface exploitable API behaviors at scale. We developed a method for passively analyzing API responses - clustering similar logic flows and flagging anomalies that suggest potential abuse paths. You’ll see how business logic vulns manifest in real-world APIs, how attackers chain together valid actions to achieve unintended outcomes, and how defenders can catch these issues early. The session will conclude with practical strategies for integrating business logic awareness into threat modeling and CI/CD pipelines.

    Speaker

    FURTHER SESSIONS

  • AI security lessons from the frontline

  • Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels

  • Beyond the Pink: Data Risks in Femtech You Can’t Ignore

  • Closing remarks

  • Join us in Amsterdam!

    November 20, 2025

    Hang out, learn something awesome and make new friends.