메뉴 건너뛰기




Volumn 24-28-October-2016, Issue , 2016, Pages 1204-1215

A comprehensive formal security analysis of OAuth 2.0

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL METHODS;

EID: 84995458933     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2976749.2978385     Document Type: Conference Paper
Times cited : (149)

References (39)
  • 1
    • 0035035153 scopus 로고    scopus 로고
    • Mobile values, new names, and secure communication
    • ACM Press
    • M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In POPL 2001, pages 104-115. ACM Press, 2001.
    • (2001) POPL 2001 , pp. 104-115
    • Abadi, M.1    Fournet, C.2
  • 2
    • 77957587422 scopus 로고    scopus 로고
    • Towards a Formal Foundation of Web Security
    • IEEE Computer Society
    • D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In CSF 2010, pages 290-304. IEEE Computer Society, 2010.
    • (2010) CSF 2010 , pp. 290-304
    • Akhawe, D.1    Barth, A.2    Lam, P.E.3    Mitchell, J.4    Song, D.5
  • 3
    • 84900537647 scopus 로고    scopus 로고
    • An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
    • Elsevier, 2013
    • A. Armando, R. Carbone, L. Compagna, J. Cuéllar, G. Pellegrino, and A. Sorniotti. An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations. Computers & Security, 33:41-58, 2013. Elsevier, 2013.
    • (2013) Computers & Security , vol.33 , pp. 41-58
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuéllar, J.4    Pellegrino, G.5    Sorniotti, A.6
  • 4
    • 70349233792 scopus 로고    scopus 로고
    • Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for google apps
    • ACM
    • A. Armando, R. Carbone, L. Compagna, J. Cuéllar, and M. L. Tobarra. Formal Analysis of SAML 2.0 Web Browser Single Sign-on: Breaking the SAML-based Single Sign-on for Google Apps. In FMSE 2008, pages 1-10. ACM, 2008.
    • (2008) FMSE 2008 , pp. 1-10
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuéllar, J.4    Tobarra, M.L.5
  • 5
    • 84874442652 scopus 로고    scopus 로고
    • Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
    • Springer
    • C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage. In POST 2013, volume 7796 of LNCS, pages 126-146. Springer, 2013.
    • (2013) POST 2013 , vol.7796 LNCS , pp. 126-146
    • Bansal, C.1    Bhargavan, K.2    Delignat-Lavaud, A.3    Maffeis, S.4
  • 6
    • 84901852615 scopus 로고    scopus 로고
    • Discovering concrete attacks on website authorization by formal analysis
    • IOS Press, 2014
    • C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Discovering Concrete Attacks on Website Authorization by Formal Analysis. Journal of Computer Security, 22(4):601-657, 2014. IOS Press, 2014.
    • (2014) Journal of Computer Security , vol.22 , Issue.4 , pp. 601-657
    • Bansal, C.1    Bhargavan, K.2    Delignat-Lavaud, A.3    Maffeis, S.4
  • 7
    • 70349266257 scopus 로고    scopus 로고
    • Robust defenses for cross-site request forgery
    • ACM
    • A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In CCS 2008, pages 75-88. ACM, 2008.
    • (2008) CCS 2008 , pp. 75-88
    • Barth, A.1    Jackson, C.2    Mitchell, J.C.3
  • 10
  • 14
    • 84914159740 scopus 로고    scopus 로고
    • An expressive model for the web infrastructure: Definition and application to the BrowserID SSO system
    • IEEE Computer Society
    • D. Fett, R. Küsters, and G. Schmitz. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System. In S&P 2014, pages 673-688. IEEE Computer Society, 2014.
    • (2014) S&P 2014 , pp. 673-688
    • Fett, D.1    Küsters, R.2    Schmitz, G.3
  • 15
    • 84951335742 scopus 로고    scopus 로고
    • Analyzing the BrowserID SSO system with primary identity providers using an expressive model of the web
    • Springer
    • D. Fett, R. Küsters, and G. Schmitz. Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web. In ESORICS 2015, volume 9326 of LNCS, pages 43-65. Springer, 2015.
    • (2015) ESORICS 2015 , vol.9326 LNCS , pp. 43-65
    • Fett, D.1    Küsters, R.2    Schmitz, G.3
  • 16
    • 84954169151 scopus 로고    scopus 로고
    • SPRESSO: A secure, privacy-respecting single sign-on system for the web
    • ACM
    • D. Fett, R. Küsters, and G. Schmitz. SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web. In CCS 2015, pages 1358-1369. ACM, 2015.
    • (2015) CCS 2015 , pp. 1358-1369
    • Fett, D.1    Küsters, R.2    Schmitz, G.3
  • 20
    • 84883284958 scopus 로고    scopus 로고
    • RFC6749 - The OAuth 2.0 authorization framework
    • Oct.
    • D. Hardt (ed.). RFC6749 - The OAuth 2.0 Authorization Framework. IETF. Oct. 2012. https://tools.ietf.org/html/rfc6749.
    • (2012) IETF
    • Hardt, D.1
  • 21
    • 84975861042 scopus 로고    scopus 로고
    • 7 February
    • E. Homakov. How I hacked Github again, 7 February 2014. http://homakov. blogspot.de/2014/02/how-i-hacked-github-again. html.
    • (2014) How I Hacked Github Again
    • Homakov, E.1
  • 22
    • 84995498968 scopus 로고    scopus 로고
    • OAuth 2.0 mix-up mitigation - Draft-ietf-oauth-mix-up-mitigation-01
    • Jul
    • M. Jones, J. Bradley, and N. Sakimura. OAuth 2.0 Mix-Up Mitigation - draft-ietf-oauth-mix-up-mitigation-01. IETF. Jul. 2016. https://tools.ietf.org/html/draft-ietf-oauth-mix-up-mitigation-01.
    • (2016) IETF
    • Jones, M.1    Bradley, J.2    Sakimura, N.3
  • 23
    • 51349083251 scopus 로고    scopus 로고
    • Simple cross-site attack prevention
    • IEEE Computer Society
    • F. Kerschbaum. Simple Cross-Site Attack Prevention. In SecureComm 2007, pages 464-472. IEEE Computer Society, 2007.
    • (2007) SecureComm 2007 , pp. 464-472
    • Kerschbaum, F.1
  • 24
    • 84995373878 scopus 로고    scopus 로고
    • Using automated model analysis for reasoning about security of web protocols
    • ACM
    • A. Kumar. Using automated model analysis for reasoning about security of web protocols. In ACSAC 2012. ACM, 2012.
    • (2012) ACSAC 2012
    • Kumar, A.1
  • 25
    • 84921322964 scopus 로고    scopus 로고
    • Security issues in OAuth 2.0 SSO implementations
    • Springer, 2014
    • W. Li and C. J. Mitchell. Security issues in OAuth 2.0 SSO implementations. In ISC 2014, volume 8783 of LNCS, pages 529-541, 2014. Springer, 2014.
    • (2014) ISC 2014 , vol.8783 LNCS , pp. 529-541
    • Li, W.1    Mitchell, C.J.2
  • 27
    • 84995492849 scopus 로고    scopus 로고
    • On the security of modern Single Sign-On Protocols: Second-Order Vulnerabilities in OpenID Connect
    • 1508.04324v2
    • V. Mladenov, C. Mainka, J. Krautwald, F. Feldmann, and J. Schwenk. On the security of modern Single Sign-On Protocols: Second-Order Vulnerabilities in OpenID Connect. CoRR, abs/1508.04324v2, 2016.
    • (2016) CoRR
    • Mladenov, V.1    Mainka, C.2    Krautwald, J.3    Feldmann, F.4    Schwenk, J.5
  • 29
    • 80052124769 scopus 로고    scopus 로고
    • Formal verification of OAuth 2.0 using alloy framework
    • IEEE
    • S. Pai, Y. Sharma, S. Kumar, R. M. Pai, and S. Singh. Formal Verification of OAuth 2.0 Using Alloy Framework. In CSNT 2011, pages 655-659. IEEE, 2011.
    • (2011) CSNT 2011 , pp. 655-659
    • Pai, S.1    Sharma, Y.2    Kumar, S.3    Pai, R.M.4    Singh, S.5
  • 30
    • 84995373890 scopus 로고    scopus 로고
    • RFC7662 - OAuth 2.0 token introspection
    • Oct.
    • J. Richer (ed.). RFC7662 - OAuth 2.0 Token Introspection. IETF. Oct. 2015. https://tools.ietf.org/html/rfc7662.
    • (2015) IETF
    • Richer, J.1
  • 32
    • 84994829187 scopus 로고    scopus 로고
    • Bypassing HTTP strict transport security
    • J. Selvi. Bypassing HTTP Strict Transport Security. In Blackhat (Europe) 2014, 2014.
    • (2014) Blackhat (Europe) 2014
    • Selvi, J.1
  • 33
    • 84911416576 scopus 로고    scopus 로고
    • Towards enhancing the security of oauth implementations in smart phones
    • IEEE
    • M. Shehab and F. Mohsen. Towards Enhancing the Security of OAuth Implementations in Smart Phones. In IEEE MS 2014. IEEE, 2014.
    • (2014) IEEE MS 2014
    • Shehab, M.1    Mohsen, F.2
  • 34
    • 84949033991 scopus 로고    scopus 로고
    • More guidelines than rules: CSRF vulnerabilities from noncompliant oauth 2.0 implementations
    • Springer
    • E. Shernan, H. Carter, D. Tian, P. Traynor, and K. R. B. Butler. More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. In DIMVA 2015, volume 9148 of LNCS, pages 239-260. Springer, 2015.
    • (2015) DIMVA 2015 , vol.9148 LNCS , pp. 239-260
    • Shernan, E.1    Carter, H.2    Tian, D.3    Traynor, P.4    Butler, K.R.B.5
  • 36
    • 84869401890 scopus 로고    scopus 로고
    • The devil is in the (implementation) details: An empirical analysis of oauth SSO systems
    • ACM
    • S.-T. Sun and K. Beznosov. The Devil is in the (Implementation) Details: An Empirical Analysis of OAuth SSO Systems. In CCS 2012, pages 378-390. ACM, 2012.
    • (2012) CCS 2012 , pp. 378-390
    • Sun, S.-T.1    Beznosov, K.2
  • 37
    • 84992342056 scopus 로고    scopus 로고
    • Explicating SDKs: Uncovering assumptions underlying secure authentication and authorization
    • USENIX Association
    • R. Wang, Y. Zhou, S. Chen, S. Qadeer, D. Evans, and Y. Gurevich. Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. In USENIX Security 2013, pages 399-314. USENIX Association, 2013.
    • (2013) USENIX Security 2013 , pp. 314-399
    • Wang, R.1    Zhou, Y.2    Chen, S.3    Qadeer, S.4    Evans, D.5    Gurevich, Y.6
  • 38
    • 84979663401 scopus 로고    scopus 로고
    • Model-based security testing: An empirical study on oauth 2.0 implementations
    • ACM
    • R. Yang, G. Li, W. C. Lau, K. Zhang, and P. Hu. Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations. In AsiaCCS 2016, pages 651-662. ACM, 2016.
    • (2016) AsiaCCS 2016 , pp. 651-662
    • Yang, R.1    Li, G.2    Lau, W.C.3    Zhang, K.4    Hu, P.5
  • 39
    • 84987614245 scopus 로고    scopus 로고
    • Cookies lack integrity: Real-world implications
    • 2015. USENIX Association, 2015
    • X. Zheng, J. Jiang, J. Liang, H. Duan, S. Chen, T. Wan, and N. Weaver. Cookies Lack Integrity: Real-World Implications. In USENIX Security 2015), pages 707-721, 2015. USENIX Association, 2015.
    • (2015) USENIX Security , pp. 707-721
    • Zheng, X.1    Jiang, J.2    Liang, J.3    Duan, H.4    Chen, S.5    Wan, T.6    Weaver, N.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.