The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems
暂无分享,去创建一个
[1] Giovanni Vigna,et al. Static Enforcement of Web Application Integrity Through Strong Typing , 2009, USENIX Security Symposium.
[2] Richard J. Enbody,et al. Malvertising – exploiting web advertising , 2011 .
[3] Phil Hunt,et al. OAuth 2.0 Threat Model and Security Considerations , 2013, RFC.
[4] P. Saxena,et al. The Emperor ’ s New APIs : On the ( In ) Secure Usage of New Client-side Primitives , 2010 .
[5] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[6] Adam Barth,et al. HTTP Authentication: MAC Access Authentication , 2011 .
[7] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[8] Alan J. Hu,et al. Protocol verification as a hardware design aid , 1992, Proceedings 1992 IEEE International Conference on Computer Design: VLSI in Computers & Processors.
[9] Kirstie Hawkey,et al. What makes users refuse web single sign-on?: an empirical investigation of OpenID , 2011, SOUPS.
[10] Dawn Xiaodong Song,et al. Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[11] Caterina Urban,et al. Formal analysis of Facebook Connect Single Sign-On authentication protocol , 2010 .
[12] Sunil Kumar,et al. Formal Verification of OAuth 2.0 Using Alloy Framework , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[13] Dawn Xiaodong Song,et al. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense , 2009, NDSS.
[14] Benjamin Livshits,et al. SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications , 2011, CCS '11.
[15] Benjamin Livshits,et al. Fast and Precise Sanitizer Analysis with BEK , 2011, USENIX Security Symposium.
[16] V. N. Venkatakrishnan,et al. Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[17] Gaylin Jee. Social media for business , 2012 .
[18] Charanjit S. Jutla,et al. Universally Composable Security Analysis of OAuth v2.0 , 2011, IACR Cryptol. ePrint Arch..
[19] Kirstie Hawkey,et al. A billion keys, but few locks: the crisis of web single sign-on , 2010, NSPW '10.
[20] Collin Jackson,et al. Securing frame communication in browsers , 2008, CACM.
[21] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[22] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[23] D. Recordon,et al. The OAuth 2.0 Authorization Protocol: Bearer Tokens draft-ietf-oauth-v2-bearer-10 , 2012 .
[24] XiaoFeng Wang,et al. Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] Benjamin Livshits,et al. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection , 2011, USENIX Security Symposium.
[26] D. Recordon,et al. The OAuth 2.0 Protocol: Bearer Tokens draft-ietf-oauth-v2-bearer-08 , 2012 .
[27] Kirstie Hawkey,et al. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures , 2012, Computers & security.
[28] David A. Maltz,et al. Inflight Modifications of Content: Who Are the Culprits? , 2011, LEET.
[29] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.