AUTHSCAN: Automatic extraction of web authentication protocols from implementations
Ideally, security protocol implementations should be formally verified before they are deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have been found in web authentication protocol implementations, especially in single-sign on (SSO) protocols implementations r...
Saved in:
Main Authors: | BAI, Guangdong, LEI, Jike, MENG, Guozhu, VENKATRAMAN, Sai Sathyanarayan, SAXENA, Prateek, SUN, Jun, LIU, Yang, DONG, Jin Song |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2013
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5008 https://ink.library.smu.edu.sg/context/sis_research/article/6011/viewcontent/ndss2013authscan.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Systematically enhancing black-box web vulnerability scanners
by: VENKATRAMAN SAI SATHYANARAYAN
Published: (2012) -
FORMALLY ANALYZING AND VERIFYING SECURE SYSTEM DESIGN AND IMPLEMENTATION
by: BAI GUANGDONG
Published: (2015) -
A verification framework for stateful security protocols
by: LI, Li, et al.
Published: (2017) -
All your sessions are belong to us: Investigating authenticator leakage through backup channels on Android
by: BAI, Guangdong, et al.
Published: (2015) -
Replay tolerance of authentication protocols
by: Lam, K.-Y.
Published: (2014)