2014
DOI: 10.3233/jcs-140503
|View full text |Cite
|
Sign up to set email alerts
|

Discovering concrete attacks on website authorization by formal analysis1

Abstract: Abstract-Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social networks, such as Facebook, Twitter, and Google, on the basis of new open standards such as the OAuth 2.0 authorization protocol. A formal analysis of these protocols must account for malicious websites and common web application vulnerabilities, such as cross-site request forgery and open redirectors. We model several configur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(13 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…Formal analysis and verification have in recent years been applied to IoT and security protocol standards using various approaches. For example, OAuth2 [12] has been formally analysed using the ProVerif static analysis tool [19], in which specific threats were identified. Another example is that of Pai et al [20], who utilised the Alloy Framework [21] to analyse the security constraints of OAuth2.…”
Section: Related Workmentioning
confidence: 99%
“…Formal analysis and verification have in recent years been applied to IoT and security protocol standards using various approaches. For example, OAuth2 [12] has been formally analysed using the ProVerif static analysis tool [19], in which specific threats were identified. Another example is that of Pai et al [20], who utilised the Alloy Framework [21] to analyse the security constraints of OAuth2.…”
Section: Related Workmentioning
confidence: 99%
“…Frostig and Slack [20] discovered a cross site request forgery attack in the Implicit Grant flow of OAuth 2.0, using the Murphi framework [6]. Bansal et al [1] analysed the security of OAuth 2.0 using the WebSpi [2] and ProVerif models [3]. However, all this work is based on abstract models, and so delicate implementation details are ignored.…”
Section: Explicit User Intention Trackingmentioning
confidence: 99%
“…-The cross social-network request forgery attack was described by Bansal, Bhargavan and Maffeis [1]. It applies to RPs using third party libraries, such as JanRain or GigYa, to manage their IdPs, as these RPs use the same login endpoint for all IdPs.…”
Section: Explicit User Intention Trackingmentioning
confidence: 99%
See 1 more Smart Citation
“…From time to time, the number of profiles and credentials that users hold are increasing. Consequently, users suffer from credentials management issues where they are unable to manage their credentials properly [1][2].…”
Section: Introductionmentioning
confidence: 99%