메뉴 건너뛰기




Volumn , Issue , 2013, Pages

AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; INTERNET PROTOCOLS; NETWORK SECURITY;

EID: 85096354052     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (88)

References (45)
  • 1
    • 85180416210 scopus 로고    scopus 로고
    • AUTHSCAN. https://sites.google.com/site/ndss2013/.
  • 2
    • 85180402634 scopus 로고    scopus 로고
    • BrowserID. https://wiki.mozilla.org/Identity/BrowserID.
    • BrowserID
  • 5
    • 84943648781 scopus 로고    scopus 로고
    • What is OpenID. http://openid.net/get-an-openid/what-isopenid/.
    • What is OpenID
  • 9
    • 85180415826 scopus 로고    scopus 로고
    • May 13
    • Mozilla jwcrypto. https://github.com/mozilla/jwcrypto, May 13, 2012.
    • (2012) Mozilla jwcrypto
  • 11
    • 84879961142 scopus 로고    scopus 로고
    • May 13
    • Wolfram alpha. http://www.wolframalpha.com/, May 13, 2012.
    • (2012) Wolfram alpha
  • 12
    • 0003092378 scopus 로고    scopus 로고
    • A Calculus for Cryptographic Protocols: The spi Calculus
    • M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The spi Calculus. Information and Computation, 148(1):1-70, 1999.
    • (1999) Information and Computation , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A. D.2
  • 13
    • 85031620050 scopus 로고
    • A Semantics for A Logic of Authentication (Extended Abstract)
    • M. Abadi and M. R. Tuttle. A Semantics for A Logic of Authentication (Extended Abstract). In PODC, pages 201-216, 1991.
    • (1991) PODC , pp. 201-216
    • Abadi, M.1    Tuttle, M. R.2
  • 14
    • 80755187803 scopus 로고    scopus 로고
    • Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
    • M. Aizatulin, A. D. Gordon, and J. Jürjens. Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. In CCS, pages 331-340, 2011.
    • (2011) CCS , pp. 331-340
    • Aizatulin, M.1    Gordon, A. D.2    Jürjens, J.3
  • 15
    • 77957587422 scopus 로고    scopus 로고
    • Towards a Formal Foundation of Web Security
    • D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In CSF, pages 290-304, 2010.
    • (2010) CSF , pp. 290-304
    • Akhawe, D.1    Barth, A.2    Lam, P. E.3    Mitchell, J.4    Song, D.5
  • 16
    • 70349233792 scopus 로고    scopus 로고
    • Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
    • A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra. Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In FMSE, pages 1-10, 2008.
    • (2008) FMSE , pp. 1-10
    • Armando, A.1    Carbone, R.2    Compagna, L.3    Cuellar, J.4    Tobarra, L.5
  • 17
    • 84866927100 scopus 로고    scopus 로고
    • Discovering Concrete Attacks on Website Authorization by Formal Analysis
    • C. Bansal, K. Bhargavan, and S. Maffeis. Discovering Concrete Attacks on Website Authorization by Formal Analysis. In CSF, pages 247-262, 2012.
    • (2012) CSF , pp. 247-262
    • Bansal, C.1    Bhargavan, K.2    Maffeis, S.3
  • 18
    • 0034822279 scopus 로고    scopus 로고
    • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    • B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW, pages 82-96, 2001.
    • (2001) CSFW , pp. 82-96
    • Blanchet, B.1
  • 19
    • 35048865382 scopus 로고    scopus 로고
    • Computationally Sound Mechanized Proofs of Correspondence Assertions
    • B. Blanchet. Computationally Sound Mechanized Proofs of Correspondence Assertions. In CSF, pages 97-111, 2007.
    • (2007) CSF , pp. 97-111
    • Blanchet, B.1
  • 20
    • 50249162614 scopus 로고    scopus 로고
    • Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
    • B. Blanchet and A. Chaudhuri. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. In S&P, pages 417-431, 2008.
    • (2008) S&P , pp. 417-431
    • Blanchet, B.1    Chaudhuri, A.2
  • 22
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
    • C. J. Cremers. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In CAV, pages 414-418, 2008.
    • (2008) CAV , pp. 414-418
    • Cremers, C. J.1
  • 23
    • 35048864876 scopus 로고    scopus 로고
    • Automatic Verification of Time Sensitive Cryptographic Protocols
    • G. Delzanno and P. Ganty. Automatic Verification of Time Sensitive Cryptographic Protocols. In TACAS, pages 342-356, 2004.
    • (2004) TACAS , pp. 342-356
    • Delzanno, G.1    Ganty, P.2
  • 26
    • 84944734046 scopus 로고    scopus 로고
    • Security Analysis of the SAML Single Sign-On Browser/Artifact Profile
    • T. Gross. Security Analysis of the SAML Single Sign-On Browser/Artifact Profile. In ACSAC, pages 298-307, 2003.
    • (2003) ACSAC , pp. 298-307
    • Gross, T.1
  • 27
    • 84860844400 scopus 로고    scopus 로고
    • The Emperor's New API: On the (In)Secure Usage of New Client Side Primitives
    • S. Hanna, E. C. R. Shinz, D. Akhawe, A. Boehmz, P. Saxena, and D. Song. The Emperor's New API: On the (In)Secure Usage of New Client Side Primitives. In W2SP, 2010.
    • (2010) W2SP
    • Hanna, S.1    Shinz, E. C. R.2    Akhawe, D.3    Boehmz, A.4    Saxena, P.5    Song, D.6
  • 28
    • 23144437178 scopus 로고    scopus 로고
    • Using Static Analysis to Validate the SAML Single Sign-On Protocol
    • S. M. Hansen, J. Skriver, and H. R. Nielson. Using Static Analysis to Validate the SAML Single Sign-On Protocol. In WITS, pages 27-40, 2005.
    • (2005) WITS , pp. 27-40
    • Hansen, S. M.1    Skriver, J.2    Nielson, H. R.3
  • 30
    • 0034839134 scopus 로고    scopus 로고
    • A Simple Method for Extracting Models for Protocol Code
    • D. Lie, A. Chou, D. Engler, and D. L. Dill. A Simple Method for Extracting Models for Protocol Code. In ISCA, pages 192-203, 2001.
    • (2001) ISCA , pp. 192-203
    • Lie, D.1    Chou, A.2    Engler, D.3    Dill, D. L.4
  • 31
    • 0342658605 scopus 로고    scopus 로고
    • Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
    • G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In TACAS, pages 147-166, 1996.
    • (1996) TACAS , pp. 147-166
    • Lowe, G.1
  • 32
    • 0030708255 scopus 로고    scopus 로고
    • A Hierarchy of Authentication Specifications
    • G. Lowe. A Hierarchy of Authentication Specifications. In CSFW, pages 31-43, 1997.
    • (1997) CSFW , pp. 31-43
    • Lowe, G.1
  • 33
    • 84892601932 scopus 로고    scopus 로고
    • Formal Analysis of Facebook Connect Single Sign-On Authentication Protocol
    • M. Miculan and C. Urban. Formal Analysis of Facebook Connect Single Sign-On Authentication Protocol. In SOF-SEM, pages 99-116, 2011.
    • (2011) SOF-SEM , pp. 99-116
    • Miculan, M.1    Urban, C.2
  • 36
    • 80051946867 scopus 로고    scopus 로고
    • FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
    • P. Saxena, S. Hanna, P. Poosankam, and D. Song. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. In NDSS, 2010.
    • (2010) NDSS
    • Saxena, P.1    Hanna, S.2    Poosankam, P.3    Song, D.4
  • 37
    • 0032678887 scopus 로고    scopus 로고
    • Athena: A New Efficient Automatic Checker for Security Protocol Analysis
    • D. X. Song. Athena: A New Efficient Automatic Checker for Security Protocol Analysis. In CSFW, pages 192-202, 1999.
    • (1999) CSFW , pp. 192-202
    • Song, D. X.1
  • 38
    • 70350222211 scopus 로고    scopus 로고
    • PAT: Towards Flexible Verification under Fairness
    • J. Sun, Y. Liu, J. S. Dong, and J. Pang. PAT: Towards Flexible Verification under Fairness. In CAV, pages 709-714, 2009.
    • (2009) CAV , pp. 709-714
    • Sun, J.1    Liu, Y.2    Dong, J. S.3    Pang, J.4
  • 39
    • 84861098079 scopus 로고    scopus 로고
    • Systematically Breaking and Fixing OpenID Security: Formal Analysis, Semi-Automated Empirical Evaluation, and Practical Countermeasures
    • S.-T. Sun, K. Hawkey, and K. Beznosov. Systematically Breaking and Fixing OpenID Security: Formal Analysis, Semi-Automated Empirical Evaluation, and Practical Countermeasures. Computers & Security, 31:465-483, 2012.
    • (2012) Computers & Security , vol.31 , pp. 465-483
    • Sun, S.-T.1    Hawkey, K.2    Beznosov, K.3
  • 40
    • 74049123721 scopus 로고    scopus 로고
    • Single Sign-On for the Internet: A Security Story
    • July
    • E. Tsyrklevich and V. Tsyrklevich. Single Sign-On for the Internet: A Security Story. In BlackHat, July 2007.
    • (2007) BlackHat
    • Tsyrklevich, E.1    Tsyrklevich, V.2
  • 41
    • 84946432389 scopus 로고    scopus 로고
    • Analysis of the SSL 3.0 protocol
    • D. Wagner and B. Schneier. Analysis of the SSL 3.0 protocol. In WOEC, volume 2, pages 29-40, 1996.
    • (1996) WOEC , vol.2 , pp. 29-40
    • Wagner, D.1    Schneier, B.2
  • 42
    • 84878355933 scopus 로고    scopus 로고
    • Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
    • R. Wang, S. Chen, and X. Wang. Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. In S&P, pages 365-379, 2012.
    • (2012) S&P , pp. 365-379
    • Wang, R.1    Chen, S.2    Wang, X.3
  • 43
    • 77955183968 scopus 로고    scopus 로고
    • TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
    • May
    • T. Wang, T. Wei, G. Gu, and W. Zou. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In S&P, May 2010.
    • (2010) S&P
    • Wang, T.1    Wei, T.2    Gu, G.3    Zou, W.4
  • 44
    • 0027205880 scopus 로고
    • A Semantic Model for Authentication Protocols
    • T. Y. C. Woo and S. S. Lam. A Semantic Model for Authentication Protocols. In S&P, pages 178-194, 1993.
    • (1993) S&P , pp. 178-194
    • Woo, T. Y. C.1    Lam, S. S.2
  • 45
    • 85180411074 scopus 로고    scopus 로고
    • InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations
    • L. Xing, Y. Chen, X. Wang, and S. Chen. InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. In NDSS, 2013.
    • (2013) NDSS
    • Xing, L.1    Chen, Y.2    Wang, X.3    Chen, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.