Χριστινάκης, 2023 - Google Patents
Auditing and extending security features of OAuth 2.0 frameworkΧριστινάκης, 2023
View PDF- Document ID
- 344930589141871930
- Author
- Χριστινάκης
- Publication year
External Links
Snippet
OAuth 2.0 is a widely adopted authorization framework used in modem web and mobile applications for secure access to protected assets. However, as the framework evolves and new security threats emerge, it becomes crucial to continuously evaluate and enhance its …
- 238000013475 authorization 0 abstract description 150
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lodderstedt et al. | OAuth 2.0 threat model and security considerations | |
Fett et al. | A comprehensive formal security analysis of OAuth 2.0 | |
Sun et al. | The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems | |
Li et al. | The {Emperor’s} new password manager: Security analysis of web-based password managers | |
Ghasemisharif et al. | O single {Sign-Off}, where art thou? an empirical analysis of single {Sign-On} account hijacking and session management on the web | |
Navas et al. | Understanding and mitigating OpenID Connect threats | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Beltran | Characterization of web single sign-on protocols | |
Mladenov et al. | On the security of modern single sign-on protocols: Second-order vulnerabilities in openid connect | |
Liu et al. | Android single sign-on security: Issues, taxonomy and directions | |
Shivakumar et al. | DXP Security | |
Li et al. | Mitigating csrf attacks on oauth 2.0 systems | |
Mayer et al. | Guardians of the clouds: When identity providers fail | |
Nash et al. | Security analysis of google authenticator, microsoft authenticator, and authy | |
Χριστινάκης | Auditing and extending security features of OAuth 2.0 framework | |
Axeland et al. | Security analysis of attack surfaces on the grant negotiation and authorization protocol | |
Sagar et al. | Information security: safeguarding resources and building trust | |
Holtmann | Single sign-on security: security analysis of real-life openid connect implementations | |
Sharma et al. | Security analysis of oauth 2.0 implementation | |
Sahu | Protocol Security | |
Wu | Authentication in Web Applications | |
Hosseyni et al. | Formal security analysis of the OpenID FAPI 2.0 family of protocols: Accompanying a standardization process | |
Singh et al. | Unified singular protocol flow for oauth (uspfo) ecosystem | |
De Ryck | Client-side web security: mitigating threats against web sessions | |
De | API Security |