메뉴 건너뛰기




Volumn , Issue , 2012, Pages 397-412

On breaking SAML: Be whoever you want to be

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL COMPONENT; FEDERATED IDENTITY; IN-DEPTH ANALYSIS; INFORMATION FLOWS; INTEGRITY PROTECTION; PENETRATION TESTING TOOLS; SECURITY ASSERTION MARKUP LANGUAGES; SIGNATURE VERIFICATION;

EID: 84915774545     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (78)

References (39)
  • 2
    • 79960855364 scopus 로고    scopus 로고
    • From multiple credentials to browser-based single sign-on: Are we more secure?
    • J. Camenisch, S. Fischer-Hbner, Y. Murayama, A. Portmann, and C. Rieder, Eds.,. of IFIP Advances in Information and Communication Technology. Springer Boston
    • ARMANDO, A., CARBONE, R., COMPAGNA, L., CUÉLLAR, J., PELLEGRINO, G., AND SORNIOTTI, A. From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? In Future Challenges in Security and Privacy for Academia and Industry, J. Camenisch, S. Fischer-Hbner, Y. Murayama, A. Portmann, and C. Rieder, Eds., vol. 354 of IFIP Advances in Information and Communication Technology. Springer Boston, 2011.
    • (2011) Future Challenges in Security and Privacy for Academia and Industry , vol.354
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuéllar, J.4    Pellegrino, G.5    Sorniotti, A.6
  • 4
    • 77954339058 scopus 로고    scopus 로고
    • Tailoring the dolev-yao abstraction to web services realities
    • E. Damiani and H. Maruyama, Eds., ACM
    • BACKES, M., AND GROSS, T. Tailoring the dolev-yao abstraction to web services realities. In SWS (2005), E. Damiani and H. Maruyama, Eds., ACM, pp. 65–74.
    • (2005) SWS , pp. 65-74
    • Backes, M.1    Gross, T.2
  • 5
    • 77954095439 scopus 로고    scopus 로고
    • A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
    • M. Malek, E. Fernández-Medina, and J. Hernando, Eds., INSTICC Press
    • BARD, G. V. A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. In SECRYPT (2006), M. Malek, E. Fernández-Medina, and J. Hernando, Eds., INSTICC Press, pp. 99–109.
    • (2006) SECRYPT , pp. 99-109
    • Bard, G.V.1
  • 6
    • 70349242702 scopus 로고    scopus 로고
    • XML rewriting attacks: Existing solutions and their limitations
    • Apr. IADIS Press
    • BENAMEUR, A., KADIR, F. A., AND FENET, S. XML Rewriting Attacks: Existing Solutions and their Limitations. In IADIS Applied Computing 2008 (Apr. 2008), IADIS Press.
    • (2008) IADIS Applied Computing 2008
    • Benameur, A.1    Kadir, F.A.2    Fenet, S.3
  • 9
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs #1
    • BLEICHENBACHER, D. Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs #1. In CRYPTO (1998), pp. 1–12.
    • (1998) CRYPTO , pp. 1-12
    • Bleichenbacher, D.1
  • 10
    • 44949218700 scopus 로고    scopus 로고
    • Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
    • 15.03. 2005
    • CANTOR, S., KEMP, J., MALER, E., AND PHILPOTT, R. Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, 15.03.2005, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf.
    • (2005) OASIS Standard
    • Cantor, S.1    Kemp, J.2    Maler, E.3    Philpott, R.4
  • 11
    • 44949218700 scopus 로고    scopus 로고
    • Assertions and protocol for the OASIS security Assertion Markup Language (SAML) V2.0
    • 15.03. 2005
    • CANTOR, S., KEMP, J., PHILPOTT, R., AND MALER, E. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, 15.03.2005, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf.
    • (2005) OASIS Standard
    • Cantor, S.1    Kemp, J.2    Philpott, R.3    Maler, E.4
  • 12
    • 44949218700 scopus 로고    scopus 로고
    • Metadata for the OASIS security assertion markup Language (SAML) v2.0
    • 15.03. 2005
    • CANTOR, S., MOREH, J., PHILPOTT, R., AND MALER, E. Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard, 15.03.2005, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf.
    • (2005) OASIS Standard
    • Cantor, S.1    Moreh, J.2    Philpott, R.3    Maler, E.4
  • 13
    • 33745907804 scopus 로고    scopus 로고
    • Weakest link attack on single sign-on and its case in saml v2.0 web sso
    • M. Gavrilova, O. Gervasi, Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds.,. of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 10.1007/11751595 54
    • CHAN, Y.-Y. Weakest link attack on single sign-on and its case in saml v2.0 web sso. In Computational Science and Its Applications - ICCSA 2006, M. Gavrilova, O. Gervasi, V. Kumar, C. Tan, D. Taniar, A. Lagan, Y. Mun, and H. Choo, Eds., vol. 3982 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2006, pp. 507–516. 10.1007/11751595 54.
    • (2006) Computational Science and Its Applications - ICCSA 2006 , vol.3982 , pp. 507-516
    • Chan, Y.-Y.1
  • 15
    • 70449469222 scopus 로고    scopus 로고
    • Analysis of signature wrapping attacks and countermeasures
    • GAJEK, S., JENSEN, M., LIAO, L., AND SCHWENK, J. Analysis of signature wrapping attacks and countermeasures. In ICWS [1], pp. 575–582.
    • ICWS , Issue.1 , pp. 575-582
    • Gajek, S.1    Jensen, M.2    Liao, L.3    Schwenk, J.4
  • 18
    • 84944734046 scopus 로고    scopus 로고
    • Security analysis of the SAML SSO browser/artifact profile
    • IEEE Computer Society
    • GROSS, T. Security Analysis of the SAML SSO Browser/Artifact Profile. In ACSAC (2003), IEEE Computer Society, pp. 298–307.
    • (2003) ACSAC , pp. 298-307
    • Gross, T.1
  • 20
    • 70449472667 scopus 로고    scopus 로고
    • Vulnerable cloud: Soap message security validation revisited
    • GRUSCHKA, N., AND IACONO, L. L. Vulnerable cloud: Soap message security validation revisited. In ICWS [1], pp. 625–631.
    • ICWS , Issue.1 , pp. 625-631
    • Gruschka, N.1    Iacono, L.L.2
  • 22
    • 41949121126 scopus 로고    scopus 로고
    • Dynamic security assertion markup language: Simplifying single sign-on
    • march-april
    • HARDING, P., JOHANSSON, L., AND KLINGENSTEIN, N. Dynamic security assertion markup language: Simplifying single sign-on. Security Privacy, IEEE 6, 2 (march-april 2008), 83 – 85.
    • (2008) Security Privacy, IEEE , vol.6 , Issue.2 , pp. 83-85
    • Harding, P.1    Johansson, L.2    Klingenstein, N.3
  • 23
    • 74049141131 scopus 로고    scopus 로고
    • The curse of names-paces in the domain of xml signature
    • E. Damiani, S. Proctor, and A. Singhal, Eds., ACM
    • JENSEN, M., LIAO, L., AND SCHWENK, J. The curse of names-paces in the domain of xml signature. In SWS (2009), E. Damiani, S. Proctor, and A. Singhal, Eds., ACM, pp. 29–36.
    • (2009) SWS , pp. 29-36
    • Jensen, M.1    Liao, L.2    Schwenk, J.3
  • 26
    • 41949086982 scopus 로고    scopus 로고
    • The venn of identity: Options and issues in federated identity management
    • march-april
    • MALER, E., AND REED, D. The venn of identity: Options and issues in federated identity management. Security Privacy, IEEE 6, 2 (march-april 2008), 16 –23.
    • (2008) Security Privacy, IEEE , vol.6 , Issue.2 , pp. 16-23
    • Maler, E.1    Reed, D.2
  • 29
    • 21244462147 scopus 로고    scopus 로고
    • Web services security: SoAP Message Security 1.1 (WS-Security 2004)
    • OASIS Standard
    • NADALIN, A., KALER, C., MONZILLO, R., AND HALLAMBAKER, P. Web Services Security: SOAP Message Security 1.1 (WS-Security 2004). OASIS Standard (2006).
    • (2006)
    • Nadalin, A.1    Kaler, C.2    Monzillo, R.3    Hallambaker, P.4
  • 30
    • 70449511744 scopus 로고    scopus 로고
    • An inline approach for secure soap requests and early validation
    • RAHAMAN, M. A., MARTEN, R., AND SCHAAD, A. An inline approach for secure soap requests and early validation. OWASP AppSec Europe, 2006.
    • (2006) OWASP AppSec Europe
    • Rahaman, M.A.1    Marten, R.2    Schaad, A.3
  • 31
    • 46849100465 scopus 로고    scopus 로고
    • Soap-based secure conversation and collaboration
    • RAHAMAN, M. A., AND SCHAAD, A. Soap-based secure conversation and collaboration. In ICWS (2007), pp. 471–480.
    • (2007) ICWS , pp. 471-480
    • Rahaman, M.A.1    Schaad, A.2
  • 34
    • 84940569741 scopus 로고    scopus 로고
    • THE APACHE SOFTWARE FOUNDATION. Apache Xerces.
    • Apache Xerces
  • 35
    • 33750012696 scopus 로고    scopus 로고
    • Using saml to protect the session initiation protocol (sip)
    • sept.-oct
    • TSCHOFENIG, H., FALK, R., PETERSON, J., HODGES, J., SICKER, D., AND POLK, J. Using saml to protect the session initiation protocol (sip). Network, IEEE 20, 5 (sept.-oct. 2006), 14 –17.
    • (2006) Network, IEEE , vol.20 , Issue.5 , pp. 14-17
    • Tschofenig, H.1    Falk, R.2    Peterson, J.3    Hodges, J.4    Sicker, D.5    Polk, J.6
  • 38
    • 84878355933 scopus 로고    scopus 로고
    • Signing me onto your accounts through Facebook and Google: A traffic-guided security study of commercially deployed single-sign-on web services
    • IEEE Computer Society May
    • WANG, R., CHEN, S., AND WANG, X. Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. In IEEE Symposium on Security and Privacy (Oakland), IEEE Computer Society (May 2012).
    • (2012) IEEE Symposium on Security and Privacy (Oakland),
    • Wang, R.1    Chen, S.2    Wang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.