SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements

L Jannett, C Mainka, M Westers… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Stealing trust: Unraveling blind message attacks in web3 authentication

K Yan, X Zhang, W Diao - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
As the field of Web3 continues its rapid expansion, the security of Web3 authentication, often
the gateway to various Web3 applications, becomes increasingly crucial. Despite its …

AuthSaber: Automated Safety Verification of OpenID Connect Programs

T Al Rahat, Y Feng, Y Tian - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Single Sign-On (SSO)-based authentication protocols, like OpenID Connect (OIDC), play a
crucial role in enhancing security and privacy in today's interconnected digital world, gaining …

Oauthguard: Protecting user security and privacy with oauth 2.0 and openid connect

W Li, CJ Mitchell, T Chen - Proceedings of the 5th ACM workshop on …, 2019 - dl.acm.org
Millions of users routinely use Google to log in to websites supporting the standardised
protocols OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is …

User access privacy in OAuth 2.0 and OpenID connect

W Li, CJ Mitchell - … IEEE European Symposium on Security and …, 2020 - ieeexplore.ieee.org
Currently widely used federated login (single sign-on) systems, notably those based on
OAuth 2.0, offer very little privacy for the user, and as a result the identity provider (eg …

OAuch: Exploring security compliance in the OAuth 2.0 ecosystem

P Philippaerts, D Preuveneers, W Joosen - Proceedings of the 25th …, 2022 - dl.acm.org
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …

Phoenix: Device-centric cellular network protocol monitoring using runtime verification

M Echeverria, Z Ahmed, B Wang, MF Arif… - arxiv preprint arxiv …, 2021 - arxiv.org
End-user-devices in the current cellular ecosystem are prone to many different
vulnerabilities across different generations and protocol layers. Fixing these vulnerabilities …

Cerberus: Query-driven scalable vulnerability detection in oauth service provider implementations

TA Rahat, Y Feng, Y Tian - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
OAuth protocols have been widely adopted to simplify user authentication and service
authorization for third-party applications. However, little effort has been devoted to …

Practical attacks on Login CSRF in OAuth

E Arshad, M Benolli, B Crispo - Computers & Security, 2022 - Elsevier
OAuth 2.0 is an important and well studied protocol. However, despite the presence of
guidelines and best practices, the current implementations are still vulnerable and error …