Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 4 von 102
Journal of computer security, 2014-01, Vol.22 (4), p.601-657
2014
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Discovering concrete attacks on website authorization by formal analysis
Ist Teil von
  • Journal of computer security, 2014-01, Vol.22 (4), p.601-657
Ort / Verlag
IOS Press
Erscheinungsjahr
2014
Quelle
Business Source Ultimate
Beschreibungen/Notizen
  • Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social networks, such as Facebook, Twitter and Google, on the basis of new open standards such as the OAuth 2.0 authorization protocol. A formal analysis of these protocols must account for malicious websites and common web application vulnerabilities, such as cross-site request forgery and open redirectors. We model several configurations of the OAuth 2.0 protocol in the applied pi-calculus and verify them using ProVerif. Our models rely on WebSpi, a new library for modeling web applications and web-based attackers that is designed to help discover concrete attacks on websites. To ease the task of writing formal models in our framework, we present a model extraction tool that automatically translates programs written in subsets of PHP and JavaScript to the applied pi-calculus. Our approach is validated by finding dozens of previously unknown vulnerabilities in popular websites such as Yahoo and WordPress, when they connect to social networks such as Twitter and Facebook.
Sprache
Englisch
Identifikatoren
ISSN: 0926-227X
eISSN: 1875-8924
DOI: 10.3233/JCS-140503
Titel-ID: cdi_hal_primary_oai_HAL_hal_01102202v1

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX