On the security of modern Single Sign-On Protocols: Second-Order Vulnerabilities in OpenID Connect
暂无分享,去创建一个
Vladislav Mladenov | Christian Mainka | Jorg Schwenk | Jörg Schwenk | Vladislav Mladenov | Christian Mainka
[1] Yuri Gurevich,et al. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization , 2013, USENIX Security Symposium.
[2] Caterina Urban,et al. Formal analysis of Facebook Connect Single Sign-On authentication protocol , 2010 .
[3] Jörg Schwenk,et al. Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud , 2014, CCSW.
[4] Yuan Tian,et al. OAuth Demystified for Mobile Application Developers , 2014, CCS.
[5] Thorsten Holz,et al. Static Detection of Second-Order Vulnerabilities in Web Applications , 2014, USENIX Security Symposium.
[6] Thomas Groß,et al. Security analysis of the SAML single sign-on browser/artifact profile , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[7] Yuchen Zhou,et al. SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities , 2014, USENIX Security Symposium.
[8] N. Sakimura,et al. JSON Web Signature (JWS) draft-ietf-jose-json-web-signature-11 , 2013 .
[9] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Konstantin Beznosov,et al. The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems , 2012, CCS.
[11] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[12] Jun Sun,et al. AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations , 2013, NDSS.
[13] XiaoFeng Wang,et al. Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services , 2012, 2012 IEEE Symposium on Security and Privacy.
[14] J. Bradley,et al. JSON Web Token (JWT) draft-ietf-oauth-json-web-token-02 , 2013 .
[15] Jerome H. Saltzer,et al. Kerberos authentication and authorization system , 1987 .
[16] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[17] XiaoFeng Wang,et al. InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations , 2013, NDSS.
[18] Michael Grabatin,et al. Integration of Dynamic Automated Metadata Exchange into the SAML 2.0 Web Browser SSO Profile , 2016 .
[19] Christopher Krügel,et al. Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel , 2014, RAID.
[20] Kirstie Hawkey,et al. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures , 2012, Computers & security.
[21] Isil Dillig,et al. Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications , 2015, CCS.
[22] Collin Jackson,et al. Securing frame communication in browsers , 2008, CACM.
[23] Jörg Schwenk,et al. On Breaking SAML: Be Whoever You Want to Be , 2012, USENIX Security Symposium.