-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM Press
-
M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In POPL 2001, pages 104-115. ACM Press, 2001.
-
(2001)
POPL 2001
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
77957587422
-
Towards a formal foundation of web security
-
IEEE Computer Society
-
D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In CSF 2010, pages 290-304. IEEE Computer Society, 2010.
-
(2010)
CSF 2010
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.E.3
Mitchell, J.4
Song, D.5
-
3
-
-
70349233792
-
Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps
-
ACM
-
A. Armando, R. Carbone, L. Compagna, J. Cuéllar, and M. L. Tobarra. Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps. In FMSE 2008, pages 1-10. ACM, 2008.
-
(2008)
FMSE 2008
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuéllar, J.4
Tobarra, M.L.5
-
4
-
-
85096354052
-
AUTHSCAN: Automatic extraction of web authentication protocols from implementations
-
G. Bai, J. Lei, G. Meng, S. S. Venkatraman, P. Saxena, J. Sun, Y. Liu, and J. S. Dong. AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. In NDSS'13. The Internet Society, 2013.
-
(2013)
NDSS'13. The Internet Society
-
-
Bai, G.1
Lei, J.2
Meng, G.3
Venkatraman, S.S.4
Saxena, P.5
Sun, J.6
Liu, Y.7
Dong, J.S.8
-
5
-
-
84874442652
-
Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
-
7796 of LNCS, Springer
-
C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage. In POST 2013, volume 7796 of LNCS, pages 126-146. Springer, 2013.
-
(2013)
POST 2013
, pp. 126-146
-
-
Bansal, C.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Maffeis, S.4
-
6
-
-
84866927100
-
Discovering concrete attacks on website authorization by formal analysis
-
IEEE Computer Society
-
C. Bansal, K. Bhargavan, and S. Maffeis. Discovering Concrete Attacks on Website Authorization by Formal Analysis. In CSF 2012, pages 247-262. IEEE Computer Society, 2012.
-
(2012)
CSF 2012
, pp. 247-262
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
7
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW-14, pages 82-96. IEEE Computer Society, 2001.
-
(2001)
CSFW-14
, pp. 82-96
-
-
Blanchet, B.1
-
9
-
-
80755168342
-
Trace equivalence decision: Negative tests and non-determinism
-
ACM
-
V. Cheval, H. Comon-Lundh, and S. Delaune. Trace equivalence decision: negative tests and non-determinism. In CCS 2011, pages 321-330. ACM, 2011.
-
(2011)
CCS 2011
, pp. 321-330
-
-
Cheval, V.1
Comon-Lundh, H.2
Delaune, S.3
-
10
-
-
84914159740
-
An expressive model for the web infrastructure: Definition and application to the browserid sso system
-
IEEE Computer Society
-
D. Fett, R. Küsters, and G. Schmitz. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System. In S&P 2014, pages 673-688. IEEE Computer Society, 2014.
-
(2014)
S&P 2014
, pp. 673-688
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
11
-
-
84954157957
-
Analyzing the browserid sso system with primary identity providers using an expressive model of the web
-
Springer
-
D. Fett, R. Küsters, and G. Schmitz. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. In ESORICS 2015, LNCS. Springer, 2015. To appear. Full version available at http://arxiv.org/abs/1411.7210.
-
(2015)
ESORICS 2015, LNCS
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
12
-
-
84954139428
-
-
Technical Report arXiv: 1508.01719, arXiv, 2015
-
D. Fett, R. Küsters, and G. Schmitz. SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web. Technical Report arXiv:1508.01719, arXiv, 2015. Available at http://arxiv.org/abs/1508.01719.
-
SPRESSO: A Secure Privacy-Respecting Single Sign-On System for the Web
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
15
-
-
84934278773
-
Alloy: A new technology for software modelling
-
2280 of LNCS, Springer
-
D. Jackson. Alloy: A New Technology for Software Modelling. In TACAS 2002, volume 2280 of LNCS, page 20. Springer, 2002.
-
(2002)
TACAS 2002
, pp. 20
-
-
Jackson, D.1
-
16
-
-
51349083251
-
Simple cross-site attack prevention
-
IEEE Computer Society
-
F. Kerschbaum. Simple Cross-Site Attack Prevention. In SecureComm 2007, pages 464-472. IEEE Computer Society, 2007.
-
(2007)
SecureComm 2007
, pp. 464-472
-
-
Kerschbaum, F.1
-
17
-
-
84906731380
-
A lightweight formal approach for analyzing security of web protocols
-
8688 of LNCS, Springer
-
A. Kumar. A Lightweight Formal Approach for Analyzing Security of Web Protocols. In RAID 2014, volume 8688 of LNCS, pages 192-211. Springer, 2014.
-
(2014)
RAID 2014
, pp. 192-211
-
-
Kumar, A.1
-
18
-
-
84970908860
-
-
Mozilla Identity Team. Persona. https://login.persona.org.
-
Persona
-
-
-
19
-
-
84954133867
-
Persona: More privacy, better security while making developers and users happy!
-
Apr. 9
-
T. Nitot. Persona: more privacy, better security while making developers and users happy! Beyond the Code Blog. Apr. 9, 2013. https://blog.mozilla.org/beyond-the-code/2013/04/09/persona-beta2/.
-
(2013)
Beyond the Code Blog
-
-
Nitot, T.1
-
20
-
-
84915774545
-
On breaking saml: Be whoever you want to be
-
USENIX Association
-
J. Somorovsky, A. Mayer, J. Schwenk, M. Kampmann, and M. Jensen. On Breaking SAML: Be Whoever You Want to Be. In USENIX 2012, pages 397-412. USENIX Association, 2012.
-
(2012)
USENIX 2012
, pp. 397-412
-
-
Somorovsky, J.1
Mayer, A.2
Schwenk, J.3
Kampmann, M.4
Jensen, M.5
-
21
-
-
84869597130
-
Security analysis of openid
-
170 of LNI, GI, 2010
-
P. Sovis, F. Kohlar, and J. Schwenk. Security Analysis of OpenID. In Sicherheit, volume 170 of LNI, pages 329-340. GI, 2010.
-
Sicherheit
, pp. 329-340
-
-
Sovis, P.1
Kohlar, F.2
Schwenk, J.3
-
23
-
-
84869401890
-
The devil is in the (implementation) details: An empirical analysis of oauth sso systems
-
ACM
-
S.-T. Sun and K. Beznosov. The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems. In CCS'12, pages 378-390. ACM, 2012.
-
(2012)
CCS'12
, pp. 378-390
-
-
Sun, S.-T.1
Beznosov, K.2
-
24
-
-
84861098079
-
Systematically breaking and fixing openid security: Formal analysis semi-automated empirical evaluation and practical countermeasures
-
S.-T. Sun, K. Hawkey, and K. Beznosov. Systematically Breaking and Fixing OpenID Security: Formal Analysis, Semi-Automated Empirical Evaluation, and Practical Countermeasures. Computers & Security, 31(4):465-483, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 465-483
-
-
Sun, S.-T.1
Hawkey, K.2
Beznosov, K.3
-
25
-
-
84878355933
-
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
-
IEEE Computer Society, 2012
-
R. Wang, S. Chen, and X. Wang. Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. In S&P 2012, pages 365-379. IEEE Computer Society, 2012.
-
(2012)
S&P
, pp. 365-379
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
26
-
-
84992342056
-
Explicating sdks: Uncovering assumptions underlying secure authentication and authorization
-
USENIX Association
-
R. Wang, Y. Zhou, S. Chen, S. Qadeer, D. Evans, and Y. Gurevich. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. In USENIX 2013, pages 399-314. USENIX Association, 2013.
-
(2013)
USENIX 2013
, pp. 399-414
-
-
Wang, R.1
Zhou, Y.2
Chen, S.3
Qadeer, S.4
Evans, D.5
Gurevich, Y.6
-
27
-
-
84987652196
-
SSOScan: Automated testing of web applications for single sign-on vulnerabilities
-
USENIX Association
-
Y. Zhou and D. Evans. SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. In USENIX 2014, pages 495-510. USENIX Association, 2014.
-
(2014)
USENIX 2014
, pp. 495-510
-
-
Zhou, Y.1
Evans, D.2
|