2005
DOI: 10.1007/0-387-24486-7_14
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modelling for Security Tokens in Web Applications

Abstract: Abstract:In the last couple of years, several European countries have started projects which intend to provide their citizens with electronic identity cards, driven by the European Directive on Electronic Signatures. One can expect that within a few years, these smart cards will be used in a wide variety of applications. In this paper, we describe the common threats that can be identified when using security tokens such as smart cards in web applications. We illustrate each of these threats with a few attack s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…Several academic teams jointly wrote a paper on analysis of threats that occurred when smart cards are used in web applications (De Cock et al, 2004). Their analysis was a part of the Designing Secure Applications (DeSecA) project, funded by Microsoft.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Several academic teams jointly wrote a paper on analysis of threats that occurred when smart cards are used in web applications (De Cock et al, 2004). Their analysis was a part of the Designing Secure Applications (DeSecA) project, funded by Microsoft.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They investigated common threats in five areas, each focusing on one particular technological building block for web applications. One of these was the smart card, and in particular the electronic identity card (De Cock et al, 2004). Sodiya et al (2006) presented an architecture for producing secure software and threat modeling was the foundation of this architecture.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, it cannot guard against a person who purchases a cell phone simply for authentication purposes, perhaps with the intention of a spoofing attack. De Cock [5] insists that the very owner of the security token is a security risk because it is easy to give away the token.…”
Section: Introductionmentioning
confidence: 99%
“…It is part of a series of papers [1,2,3,4,5], written by different academic teams, that each focus on one particular technological building block for web applications. Each of these papers (including this one) starts from the generic architecture for web applications presented in [1].…”
Section: Introductionmentioning
confidence: 99%