2020
DOI: 10.1007/978-3-030-58951-6_2
|View full text |Cite
|
Sign up to set email alerts
|

Bulwark: Holistic and Verified Security Monitoring of Web Protocols

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Calzavara et al [28] study the browser-side (i.e., client-side) security for using OAuth 2.0 while considering the service providers as black-box. Veronese et al [42] propose a networktraffic-based security monitoring system for different entities of OAuth. However, these studies are focused on the security implications on the client-side OAuth flow and depend on manual analysis by security experts such as monitoring the network traffic or inferring the protocol flows and cannot be applied or extended to detect missing or incorrect security checks on the server-side implementation.…”
Section: Related Workmentioning
confidence: 99%
“…Calzavara et al [28] study the browser-side (i.e., client-side) security for using OAuth 2.0 while considering the service providers as black-box. Veronese et al [42] propose a networktraffic-based security monitoring system for different entities of OAuth. However, these studies are focused on the security implications on the client-side OAuth flow and depend on manual analysis by security experts such as monitoring the network traffic or inferring the protocol flows and cannot be applied or extended to detect missing or incorrect security checks on the server-side implementation.…”
Section: Related Workmentioning
confidence: 99%