Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social networks, such as Facebook, Twitter, and Google, on the basis of new open standards such as the OAuth 2.0 authorization protocol. A formal analysis of these protocols must account for malicious websites and common web application vulnerabilities, such as cross-site request forgery and open redirectors. We model several configurations of the OAuth 2.0 protocol in the applied pi-calculus and verify them using ProVerif. Our models rely on WebSpi, a new library for modeling web applications and web-based attackers that is designed to help discover concrete attacks on web...
Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In th...
Despite all effort of the security community, for example initiatives as the OWASP Top 10, it is a k...
Despite all effort of the security community, for example initiatives as the OWASP Top 10, it is a k...
International audienceSocial sign-on and social sharing are becoming an ever more popular feature of...
International audienceSocial sign-on and social sharing are becoming an ever more popular feature of...
Abstract—Social sign-on and social sharing are becoming an ever more popular feature of web applicat...
Abstract—Social sign-on and social sharing are becoming an ever more popular feature of web applicat...
Social sign-on and social sharing are becoming an ever more popular fea-ture of web applications. Th...
The world wide web today serves as a distributed application platform. Its origins, however, go back...
Indiana University-Purdue University Indianapolis (IUPUI)The web applications are now being used in ...
Businesses and society alike have been heavily dependent on Internet-based services, albeit with exp...
Tato práce prozkoumává nejrozšířenější útoky a rizika v oblasti vývoje webových aplikací. V první čá...
Websites commonly use HTTPS to protect their users' private data from network-based attackers. By co...
International audienceTo protect sensitive user data against server-side attacks, a number of securi...
Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In th...
Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In th...
Despite all effort of the security community, for example initiatives as the OWASP Top 10, it is a k...
Despite all effort of the security community, for example initiatives as the OWASP Top 10, it is a k...
International audienceSocial sign-on and social sharing are becoming an ever more popular feature of...
International audienceSocial sign-on and social sharing are becoming an ever more popular feature of...
Abstract—Social sign-on and social sharing are becoming an ever more popular feature of web applicat...
Abstract—Social sign-on and social sharing are becoming an ever more popular feature of web applicat...
Social sign-on and social sharing are becoming an ever more popular fea-ture of web applications. Th...
The world wide web today serves as a distributed application platform. Its origins, however, go back...
Indiana University-Purdue University Indianapolis (IUPUI)The web applications are now being used in ...
Businesses and society alike have been heavily dependent on Internet-based services, albeit with exp...
Tato práce prozkoumává nejrozšířenější útoky a rizika v oblasti vývoje webových aplikací. V první čá...
Websites commonly use HTTPS to protect their users' private data from network-based attackers. By co...
International audienceTo protect sensitive user data against server-side attacks, a number of securi...
Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In th...
Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In th...
Despite all effort of the security community, for example initiatives as the OWASP Top 10, it is a k...
Despite all effort of the security community, for example initiatives as the OWASP Top 10, it is a k...