Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …
primitives, defined by rewrite rules or by equations. It can prove various security properties …
Surviving the web: A journey into web session security
In this article, we survey the most common attacks against web sessions, that is, attacks that
target honest web browser users establishing an authenticated session with a trusted web …
target honest web browser users establishing an authenticated session with a trusted web …
A comprehensive formal security analysis of OAuth 2.0
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …
Discovering concrete attacks on website authorization by formal analysis
C Bansal, K Bhargavan… - Journal of Computer …, 2014 - content.iospress.com
Social sign-on and social sharing are becoming an ever more popular feature of web
applications. This success is largely due to the APIs and support offered by prominent social …
applications. This success is largely due to the APIs and support offered by prominent social …
The web sso standard openid connect: In-depth formal security analysis and security guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
An expressive model for the web infrastructure: Definition and application to the browser id sso system
The web constitutes a complex infrastructure and, as demonstrated by numerous attacks,
rigorous analysis of standards and web applications is indispensable. Inspired by successful …
rigorous analysis of standards and web applications is indispensable. Inspired by successful …
Spresso: A secure, privacy-respecting single sign-on system for the web
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called
relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as …
relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as …
[HTML][HTML] Formal methods for web security
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
CVSS: A cost-efficient and QoS-aware video streaming using cloud services
Video streams, either in form of on-demand streaming or live streaming, usually have to be
converted (ie, transcoded) based on the characteristics of clients' devices (eg, spatial …
converted (ie, transcoded) based on the characteristics of clients' devices (eg, spatial …
Security evaluation of the OAuth 2.0 framework
Purpose–The interoperability of cloud data between web applications and mobile devices
has vastly improved over recent years. The popularity of social media, smartphones and …
has vastly improved over recent years. The popularity of social media, smartphones and …