Главная
Study mode:
on
1
Intro
2
Our Contributions
3
Formal Analysis of Web Applications and Standards
4
Sources
5
Web Model
6
Web Browser Model
7
Limitations
8
Previous Work
9
OAuth Modes
10
Multiple IdPs
11
Authorization Property
12
Authentication Property
13
Session Integrity Property
14
Attacks: Overview
15
307 Redirect Attack
16
IdP Mix-Up Attack in implicit Mode
17
IdP Mix-Up Attack: Mitigation
18
Impact
19
Proof: Assumptions
20
Session Integrity: Network Attacker
21
OAuth 2.0: Security Proof
22
Some Related Work
Description:
Explore a comprehensive formal security analysis of OAuth 2.0 in this 25-minute conference talk presented at CCS 2016, the 23rd ACM Conference on Computer and Communications Security. Delve into the contributions, formal analysis methods, and web application standards discussed by authors Daniel Fett, Ralf Küsters, and Guido Schmitz from the University of Trier. Examine the web model, browser model, and limitations of OAuth 2.0. Investigate various OAuth modes, multiple IdPs, and key security properties including authorization, authentication, and session integrity. Uncover potential attacks, such as the 307 Redirect Attack and IdP Mix-Up Attack, along with their mitigation strategies. Gain insights into the security proof assumptions, network attacker scenarios, and related work in the field of OAuth 2.0 security analysis.

A Comprehensive Formal Security Analysis of OAuth 2.0

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00