-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM Press
-
M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In POPL 2001, pages 104-115. ACM Press, 2001.
-
(2001)
POPL 2001
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
77957587422
-
Towards a Formal Foundation of Web Security
-
IEEE Computer Society
-
D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In CSF 2010, pages 290-304. IEEE Computer Society, 2010.
-
(2010)
CSF 2010
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.E.3
Mitchell, J.4
Song, D.5
-
3
-
-
84900537647
-
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
-
Elsevier, 2013
-
A. Armando, R. Carbone, L. Compagna, J. Cuéllar, G. Pellegrino, and A. Sorniotti. An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations. Computers & Security, 33:41-58, 2013. Elsevier, 2013.
-
(2013)
Computers & Security
, vol.33
, pp. 41-58
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuéllar, J.4
Pellegrino, G.5
Sorniotti, A.6
-
4
-
-
70349233792
-
Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for google apps
-
ACM
-
A. Armando, R. Carbone, L. Compagna, J. Cuéllar, and M. L. Tobarra. Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps. In FMSE 2008, pages 1-10. ACM, 2008.
-
(2008)
FMSE 2008
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuéllar, J.4
Tobarra, M.L.5
-
5
-
-
84874442652
-
Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
-
Springer
-
C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage. In POST 2013, volume 7796 of LNCS, pages 126-146. Springer, 2013.
-
(2013)
POST 2013
, vol.7796 LNCS
, pp. 126-146
-
-
Bansal, C.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Maffeis, S.4
-
6
-
-
84901852615
-
Discovering concrete attacks on website authorization by formal analysis
-
IOS Press, 2014
-
C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Discovering Concrete Attacks on Website Authorization by Formal Analysis. Journal of Computer Security, 22(4):601-657, 2014. IOS Press, 2014.
-
(2014)
Journal of Computer Security
, vol.22
, Issue.4
, pp. 601-657
-
-
Bansal, C.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Maffeis, S.4
-
7
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
ACM
-
A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In CCS 2008, pages 75-88. ACM, 2008.
-
(2008)
CCS 2008
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
10
-
-
84910671293
-
Oauth demystified for mobile application developers
-
E. Y. Chen, Y. Pei, S. Chen, Y. Tian, R. Kotcher, and P. Tague. OAuth Demystified for Mobile Application Developers. In CCS 2014, pages 892-903, 2014.
-
(2014)
CCS 2014
, pp. 892-903
-
-
Chen, E.Y.1
Pei, Y.2
Chen, S.3
Tian, Y.4
Kotcher, R.5
Tague, P.6
-
14
-
-
84914159740
-
An expressive model for the web infrastructure: Definition and application to the BrowserID SSO system
-
IEEE Computer Society
-
D. Fett, R. Küsters, and G. Schmitz. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System. In S&P 2014, pages 673-688. IEEE Computer Society, 2014.
-
(2014)
S&P 2014
, pp. 673-688
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
15
-
-
84951335742
-
Analyzing the BrowserID SSO system with primary identity providers using an expressive model of the web
-
Springer
-
D. Fett, R. Küsters, and G. Schmitz. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. In ESORICS 2015, volume 9326 of LNCS, pages 43-65. Springer, 2015.
-
(2015)
ESORICS 2015
, vol.9326 LNCS
, pp. 43-65
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
16
-
-
84954169151
-
SPRESSO: A secure, privacy-respecting single sign-on system for the web
-
ACM
-
D. Fett, R. Küsters, and G. Schmitz. SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web. In CCS 2015, pages 1358-1369. ACM, 2015.
-
(2015)
CCS 2015
, pp. 1358-1369
-
-
Fett, D.1
Küsters, R.2
Schmitz, G.3
-
19
-
-
0003365506
-
RFC2617 - HTTP authentication: Basic and digest access authentication
-
Jun.
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. RFC2617 - HTTP Authentication: Basic and Digest Access Authentication. IETF. Jun. 1999. https://tools.ietf.org/html/rfc2617.
-
(1999)
IETF
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
20
-
-
84883284958
-
RFC6749 - The OAuth 2.0 authorization framework
-
Oct.
-
D. Hardt (ed.). RFC6749 - The OAuth 2.0 Authorization Framework. IETF. Oct. 2012. https://tools.ietf.org/html/rfc6749.
-
(2012)
IETF
-
-
Hardt, D.1
-
21
-
-
84975861042
-
-
7 February
-
E. Homakov. How I hacked Github again, 7 February 2014. http://homakov. blogspot.de/2014/02/how-i-hacked-github-again. html.
-
(2014)
How I Hacked Github Again
-
-
Homakov, E.1
-
22
-
-
84995498968
-
OAuth 2.0 mix-up mitigation - Draft-ietf-oauth-mix-up-mitigation-01
-
Jul
-
M. Jones, J. Bradley, and N. Sakimura. OAuth 2.0 Mix-Up Mitigation - draft-ietf-oauth-mix-up-mitigation-01. IETF. Jul. 2016. https://tools.ietf.org/html/draft-ietf-oauth-mix-up-mitigation-01.
-
(2016)
IETF
-
-
Jones, M.1
Bradley, J.2
Sakimura, N.3
-
23
-
-
51349083251
-
Simple cross-site attack prevention
-
IEEE Computer Society
-
F. Kerschbaum. Simple Cross-Site Attack Prevention. In SecureComm 2007, pages 464-472. IEEE Computer Society, 2007.
-
(2007)
SecureComm 2007
, pp. 464-472
-
-
Kerschbaum, F.1
-
24
-
-
84995373878
-
Using automated model analysis for reasoning about security of web protocols
-
ACM
-
A. Kumar. Using automated model analysis for reasoning about security of web protocols. In ACSAC 2012. ACM, 2012.
-
(2012)
ACSAC 2012
-
-
Kumar, A.1
-
25
-
-
84921322964
-
Security issues in OAuth 2.0 SSO implementations
-
Springer, 2014
-
W. Li and C. J. Mitchell. Security issues in OAuth 2.0 SSO implementations. In ISC 2014, volume 8783 of LNCS, pages 529-541, 2014. Springer, 2014.
-
(2014)
ISC 2014
, vol.8783 LNCS
, pp. 529-541
-
-
Li, W.1
Mitchell, C.J.2
-
27
-
-
84995492849
-
On the security of modern Single Sign-On Protocols: Second-Order Vulnerabilities in OpenID Connect
-
1508.04324v2
-
V. Mladenov, C. Mainka, J. Krautwald, F. Feldmann, and J. Schwenk. On the security of modern Single Sign-On Protocols: Second-Order Vulnerabilities in OpenID Connect. CoRR, abs/1508.04324v2, 2016.
-
(2016)
CoRR
-
-
Mladenov, V.1
Mainka, C.2
Krautwald, J.3
Feldmann, F.4
Schwenk, J.5
-
29
-
-
80052124769
-
Formal verification of OAuth 2.0 using alloy framework
-
IEEE
-
S. Pai, Y. Sharma, S. Kumar, R. M. Pai, and S. Singh. Formal Verification of OAuth 2.0 Using Alloy Framework. In CSNT 2011, pages 655-659. IEEE, 2011.
-
(2011)
CSNT 2011
, pp. 655-659
-
-
Pai, S.1
Sharma, Y.2
Kumar, S.3
Pai, R.M.4
Singh, S.5
-
30
-
-
84995373890
-
RFC7662 - OAuth 2.0 token introspection
-
Oct.
-
J. Richer (ed.). RFC7662 - OAuth 2.0 Token Introspection. IETF. Oct. 2015. https://tools.ietf.org/html/rfc7662.
-
(2015)
IETF
-
-
Richer, J.1
-
31
-
-
84938097389
-
OpenID connect core 1.0 incorporating errata set 1
-
Nov. 8
-
N. Sakimura, J. Bradley, M. Jones, B. de Medeiros, and C. Mortimore. OpenID Connect Core 1.0 incorporating errata set 1. OpenID Foundation. Nov. 8, 2014. http://openid.net/specs/openid-connect-core-1-0.html.
-
(2014)
OpenID Foundation
-
-
Sakimura, N.1
Bradley, J.2
Jones, M.3
De Medeiros, B.4
Mortimore, C.5
-
32
-
-
84994829187
-
Bypassing HTTP strict transport security
-
J. Selvi. Bypassing HTTP Strict Transport Security. In Blackhat (Europe) 2014, 2014.
-
(2014)
Blackhat (Europe) 2014
-
-
Selvi, J.1
-
33
-
-
84911416576
-
Towards enhancing the security of oauth implementations in smart phones
-
IEEE
-
M. Shehab and F. Mohsen. Towards Enhancing the Security of OAuth Implementations in Smart Phones. In IEEE MS 2014. IEEE, 2014.
-
(2014)
IEEE MS 2014
-
-
Shehab, M.1
Mohsen, F.2
-
34
-
-
84949033991
-
More guidelines than rules: CSRF vulnerabilities from noncompliant oauth 2.0 implementations
-
Springer
-
E. Shernan, H. Carter, D. Tian, P. Traynor, and K. R. B. Butler. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. In DIMVA 2015, volume 9148 of LNCS, pages 239-260. Springer, 2015.
-
(2015)
DIMVA 2015
, vol.9148 LNCS
, pp. 239-260
-
-
Shernan, E.1
Carter, H.2
Tian, D.3
Traynor, P.4
Butler, K.R.B.5
-
36
-
-
84869401890
-
The devil is in the (implementation) details: An empirical analysis of oauth SSO systems
-
ACM
-
S.-T. Sun and K. Beznosov. The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems. In CCS 2012, pages 378-390. ACM, 2012.
-
(2012)
CCS 2012
, pp. 378-390
-
-
Sun, S.-T.1
Beznosov, K.2
-
37
-
-
84992342056
-
Explicating SDKs: Uncovering assumptions underlying secure authentication and authorization
-
USENIX Association
-
R. Wang, Y. Zhou, S. Chen, S. Qadeer, D. Evans, and Y. Gurevich. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. In USENIX Security 2013, pages 399-314. USENIX Association, 2013.
-
(2013)
USENIX Security 2013
, pp. 314-399
-
-
Wang, R.1
Zhou, Y.2
Chen, S.3
Qadeer, S.4
Evans, D.5
Gurevich, Y.6
-
38
-
-
84979663401
-
Model-based security testing: An empirical study on oauth 2.0 implementations
-
ACM
-
R. Yang, G. Li, W. C. Lau, K. Zhang, and P. Hu. Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations. In AsiaCCS 2016, pages 651-662. ACM, 2016.
-
(2016)
AsiaCCS 2016
, pp. 651-662
-
-
Yang, R.1
Li, G.2
Lau, W.C.3
Zhang, K.4
Hu, P.5
-
39
-
-
84987614245
-
Cookies lack integrity: Real-world implications
-
2015. USENIX Association, 2015
-
X. Zheng, J. Jiang, J. Liang, H. Duan, S. Chen, T. Wan, and N. Weaver. Cookies Lack Integrity: Real-World Implications. In USENIX Security 2015), pages 707-721, 2015. USENIX Association, 2015.
-
(2015)
USENIX Security
, pp. 707-721
-
-
Zheng, X.1
Jiang, J.2
Liang, J.3
Duan, H.4
Chen, S.5
Wan, T.6
Weaver, N.7
|