-
1
-
-
85180416210
-
-
AUTHSCAN. https://sites.google.com/site/ndss2013/.
-
-
-
-
2
-
-
85180402634
-
-
BrowserID. https://wiki.mozilla.org/Identity/BrowserID.
-
BrowserID
-
-
-
5
-
-
84943648781
-
-
What is OpenID. http://openid.net/get-an-openid/what-isopenid/.
-
What is OpenID
-
-
-
9
-
-
85180415826
-
-
May 13
-
Mozilla jwcrypto. https://github.com/mozilla/jwcrypto, May 13, 2012.
-
(2012)
Mozilla jwcrypto
-
-
-
11
-
-
84879961142
-
-
May 13
-
Wolfram alpha. http://www.wolframalpha.com/, May 13, 2012.
-
(2012)
Wolfram alpha
-
-
-
12
-
-
0003092378
-
A Calculus for Cryptographic Protocols: The spi Calculus
-
M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The spi Calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A. D.2
-
13
-
-
85031620050
-
A Semantics for A Logic of Authentication (Extended Abstract)
-
M. Abadi and M. R. Tuttle. A Semantics for A Logic of Authentication (Extended Abstract). In PODC, pages 201-216, 1991.
-
(1991)
PODC
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M. R.2
-
14
-
-
80755187803
-
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
-
M. Aizatulin, A. D. Gordon, and J. Jürjens. Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution. In CCS, pages 331-340, 2011.
-
(2011)
CCS
, pp. 331-340
-
-
Aizatulin, M.1
Gordon, A. D.2
Jürjens, J.3
-
15
-
-
77957587422
-
Towards a Formal Foundation of Web Security
-
D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In CSF, pages 290-304, 2010.
-
(2010)
CSF
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P. E.3
Mitchell, J.4
Song, D.5
-
16
-
-
70349233792
-
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra. Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In FMSE, pages 1-10, 2008.
-
(2008)
FMSE
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Tobarra, L.5
-
17
-
-
84866927100
-
Discovering Concrete Attacks on Website Authorization by Formal Analysis
-
C. Bansal, K. Bhargavan, and S. Maffeis. Discovering Concrete Attacks on Website Authorization by Formal Analysis. In CSF, pages 247-262, 2012.
-
(2012)
CSF
, pp. 247-262
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
18
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW, pages 82-96, 2001.
-
(2001)
CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
19
-
-
35048865382
-
Computationally Sound Mechanized Proofs of Correspondence Assertions
-
B. Blanchet. Computationally Sound Mechanized Proofs of Correspondence Assertions. In CSF, pages 97-111, 2007.
-
(2007)
CSF
, pp. 97-111
-
-
Blanchet, B.1
-
20
-
-
50249162614
-
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
-
B. Blanchet and A. Chaudhuri. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. In S&P, pages 417-431, 2008.
-
(2008)
S&P
, pp. 417-431
-
-
Blanchet, B.1
Chaudhuri, A.2
-
22
-
-
48949088211
-
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
-
C. J. Cremers. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In CAV, pages 414-418, 2008.
-
(2008)
CAV
, pp. 414-418
-
-
Cremers, C. J.1
-
23
-
-
35048864876
-
Automatic Verification of Time Sensitive Cryptographic Protocols
-
G. Delzanno and P. Ganty. Automatic Verification of Time Sensitive Cryptographic Protocols. In TACAS, pages 342-356, 2004.
-
(2004)
TACAS
, pp. 342-356
-
-
Delzanno, G.1
Ganty, P.2
-
26
-
-
84944734046
-
Security Analysis of the SAML Single Sign-On Browser/Artifact Profile
-
T. Gross. Security Analysis of the SAML Single Sign-On Browser/Artifact Profile. In ACSAC, pages 298-307, 2003.
-
(2003)
ACSAC
, pp. 298-307
-
-
Gross, T.1
-
27
-
-
84860844400
-
The Emperor's New API: On the (In)Secure Usage of New Client Side Primitives
-
S. Hanna, E. C. R. Shinz, D. Akhawe, A. Boehmz, P. Saxena, and D. Song. The Emperor's New API: On the (In)Secure Usage of New Client Side Primitives. In W2SP, 2010.
-
(2010)
W2SP
-
-
Hanna, S.1
Shinz, E. C. R.2
Akhawe, D.3
Boehmz, A.4
Saxena, P.5
Song, D.6
-
28
-
-
23144437178
-
Using Static Analysis to Validate the SAML Single Sign-On Protocol
-
S. M. Hansen, J. Skriver, and H. R. Nielson. Using Static Analysis to Validate the SAML Single Sign-On Protocol. In WITS, pages 27-40, 2005.
-
(2005)
WITS
, pp. 27-40
-
-
Hansen, S. M.1
Skriver, J.2
Nielson, H. R.3
-
29
-
-
84969225408
-
On Breaking SAML: Be Whoever You Want to Be
-
S. Juraj, M. Andreas, S. Jörg, K. Marco, and J. Meiko. On Breaking SAML: Be Whoever You Want to Be. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Juraj, S.1
Andreas, M.2
Jörg, S.3
Marco, K.4
Meiko, J.5
-
30
-
-
0034839134
-
A Simple Method for Extracting Models for Protocol Code
-
D. Lie, A. Chou, D. Engler, and D. L. Dill. A Simple Method for Extracting Models for Protocol Code. In ISCA, pages 192-203, 2001.
-
(2001)
ISCA
, pp. 192-203
-
-
Lie, D.1
Chou, A.2
Engler, D.3
Dill, D. L.4
-
31
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In TACAS, pages 147-166, 1996.
-
(1996)
TACAS
, pp. 147-166
-
-
Lowe, G.1
-
32
-
-
0030708255
-
A Hierarchy of Authentication Specifications
-
G. Lowe. A Hierarchy of Authentication Specifications. In CSFW, pages 31-43, 1997.
-
(1997)
CSFW
, pp. 31-43
-
-
Lowe, G.1
-
33
-
-
84892601932
-
Formal Analysis of Facebook Connect Single Sign-On Authentication Protocol
-
M. Miculan and C. Urban. Formal Analysis of Facebook Connect Single Sign-On Authentication Protocol. In SOF-SEM, pages 99-116, 2011.
-
(2011)
SOF-SEM
, pp. 99-116
-
-
Miculan, M.1
Urban, C.2
-
35
-
-
77955220343
-
A Symbolic Execution Framework for JavaScript
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song. A Symbolic Execution Framework for JavaScript. In S&P, pages 513-528, 2010.
-
(2010)
S&P
, pp. 513-528
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
36
-
-
80051946867
-
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
-
P. Saxena, S. Hanna, P. Poosankam, and D. Song. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. In NDSS, 2010.
-
(2010)
NDSS
-
-
Saxena, P.1
Hanna, S.2
Poosankam, P.3
Song, D.4
-
37
-
-
0032678887
-
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
-
D. X. Song. Athena: A New Efficient Automatic Checker for Security Protocol Analysis. In CSFW, pages 192-202, 1999.
-
(1999)
CSFW
, pp. 192-202
-
-
Song, D. X.1
-
38
-
-
70350222211
-
PAT: Towards Flexible Verification under Fairness
-
J. Sun, Y. Liu, J. S. Dong, and J. Pang. PAT: Towards Flexible Verification under Fairness. In CAV, pages 709-714, 2009.
-
(2009)
CAV
, pp. 709-714
-
-
Sun, J.1
Liu, Y.2
Dong, J. S.3
Pang, J.4
-
39
-
-
84861098079
-
Systematically Breaking and Fixing OpenID Security: Formal Analysis, Semi-Automated Empirical Evaluation, and Practical Countermeasures
-
S.-T. Sun, K. Hawkey, and K. Beznosov. Systematically Breaking and Fixing OpenID Security: Formal Analysis, Semi-Automated Empirical Evaluation, and Practical Countermeasures. Computers & Security, 31:465-483, 2012.
-
(2012)
Computers & Security
, vol.31
, pp. 465-483
-
-
Sun, S.-T.1
Hawkey, K.2
Beznosov, K.3
-
40
-
-
74049123721
-
Single Sign-On for the Internet: A Security Story
-
July
-
E. Tsyrklevich and V. Tsyrklevich. Single Sign-On for the Internet: A Security Story. In BlackHat, July 2007.
-
(2007)
BlackHat
-
-
Tsyrklevich, E.1
Tsyrklevich, V.2
-
41
-
-
84946432389
-
Analysis of the SSL 3.0 protocol
-
D. Wagner and B. Schneier. Analysis of the SSL 3.0 protocol. In WOEC, volume 2, pages 29-40, 1996.
-
(1996)
WOEC
, vol.2
, pp. 29-40
-
-
Wagner, D.1
Schneier, B.2
-
42
-
-
84878355933
-
Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
-
R. Wang, S. Chen, and X. Wang. Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services. In S&P, pages 365-379, 2012.
-
(2012)
S&P
, pp. 365-379
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
43
-
-
77955183968
-
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
-
May
-
T. Wang, T. Wei, G. Gu, and W. Zou. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In S&P, May 2010.
-
(2010)
S&P
-
-
Wang, T.1
Wei, T.2
Gu, G.3
Zou, W.4
-
44
-
-
0027205880
-
A Semantic Model for Authentication Protocols
-
T. Y. C. Woo and S. S. Lam. A Semantic Model for Authentication Protocols. In S&P, pages 178-194, 1993.
-
(1993)
S&P
, pp. 178-194
-
-
Woo, T. Y. C.1
Lam, S. S.2
-
45
-
-
85180411074
-
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations
-
L. Xing, Y. Chen, X. Wang, and S. Chen. InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. In NDSS, 2013.
-
(2013)
NDSS
-
-
Xing, L.1
Chen, Y.2
Wang, X.3
Chen, S.4
|