SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
The leaky web: Automated discovery of cross-site information leaks in browsers and the web
When browsing the web, none of us want sites to infer which other sites we may have visited
before or are logged in to. However, attacker-controlled sites may infer this state through …
before or are logged in to. However, attacker-controlled sites may infer this state through …
The Great Request Robbery: An Empirical Study of Client-side Request Hijacking Vulnerabilities on the Web
Request forgery attacks are among the oldest threats to Web applications, traditionally
caused by server-side confused deputy vulnerabilities. However, recent advancements in …
caused by server-side confused deputy vulnerabilities. However, recent advancements in …
[PDF][PDF] Tabbed Out: Subverting the Android Custom Tab Security Model
Mobile operating systems provide developers with various mobile-to-Web bridges to display
Web pages inside native applications. A recently introduced component called Custom Tab …
Web pages inside native applications. A recently introduced component called Custom Tab …
[HTML][HTML] Evolution of web tracking protection in Chrome
In our society, protecting users' privacy is of utmost importance, especially when users
access websites. Increased awareness of privacy concerns has led web browsers to …
access websites. Increased awareness of privacy concerns has led web browsers to …
Investigating Deployment Issues of DNS Root Server Instances from a China-wide View
DNS root servers are the starting point of most DNS queries. To ensure their security and
stability, multiple anycast instances are operated worldwide, and new root instances have …
stability, multiple anycast instances are operated worldwide, and new root instances have …
Machine learning for detection and mitigation of web vulnerabilities and web attacks
M Shahid - arxiv preprint arxiv:2304.14451, 2023 - arxiv.org
Detection and mitigation of critical web vulnerabilities and attacks like cross-site scripting
(XSS), and cross-site request forgery (CSRF) have been a great concern in the field of web …
(XSS), and cross-site request forgery (CSRF) have been a great concern in the field of web …
CSRFing the SSO waves: Security testing of SSO-based account linking process
The Single Sign-On based account linking process (SSOLinking in short) allows users to link
their accounts at Service Provider (SP) websites to their Identity Providers (IdP) accounts …
their accounts at Service Provider (SP) websites to their Identity Providers (IdP) accounts …
AdCPG: Classifying JavaScript Code Property Graphs with Explanations for Ad and Tracker Blocking
C Lee, S Son - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Advertising and tracking service (ATS) blocking has been safeguarding the privacy of
millions of Internet users from privacy-invasive tracking behaviors. Previous research has …
millions of Internet users from privacy-invasive tracking behaviors. Previous research has …
Crumbled Cookies: Exploring E-commerce Websites' Cookie Policies with Data Protection Regulations
Despite stringent data protection regulations, such as the General Data Protection
Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other country-specific …
Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other country-specific …