DISTINCT: identity theft using in-browser communications in dual-window single sign-on

L Jannett, V Mladenov, C Mainka… - Proceedings of the 2022 …, 2022 - dl.acm.org
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …

Oauthguard: Protecting user security and privacy with oauth 2.0 and openid connect

W Li, CJ Mitchell, T Chen - Proceedings of the 5th ACM workshop on …, 2019 - dl.acm.org
Millions of users routinely use Google to log in to websites supporting the standardised
protocols OAuth 2.0 or OpenID Connect; the security of OAuth 2.0 and OpenID Connect is …

User access privacy in OAuth 2.0 and OpenID connect

W Li, CJ Mitchell - … IEEE European Symposium on Security and …, 2020 - ieeexplore.ieee.org
Currently widely used federated login (single sign-on) systems, notably those based on
OAuth 2.0, offer very little privacy for the user, and as a result the identity provider (eg …

OAuch: Exploring security compliance in the OAuth 2.0 ecosystem

P Philippaerts, D Preuveneers, W Joosen - Proceedings of the 25th …, 2022 - dl.acm.org
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been
proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue …

Descriptive Analysis of Built-in Security Features in Web Development Frameworks

A Aborujilah, J Adamu, SM Shariff… - 2022 16th International …, 2022 - ieeexplore.ieee.org
Many challenges are facing modern web applications, and security is a major concern for
web applications developers especially when today's web applications are interactive and …

[HTML][HTML] Securing the Gatekeeper: Addressing Vulnerabilities in OAuth Implementations for Enhanced Web Security

S Bhattacharya, M Najana, A Khanna… - International Journal of …, 2024 - ijgis.pubpub.org
This research delves into the vulnerabilities associated with the OAuth protocol, which plays
a role, in web security by allowing third party applications to access online services. Despite …

Managing a secure refresh token implementation with json web token in rest api

E Rushdy, W Khedr, N Salah - Full Length Article, 2021 - americaspg.com
Abstract JSON Web Token (JWT) is a compact and self-contained mechanism, digitally
authenticated and trusted, for transmitting data between various parties. They are mainly …

On the perils of leaking referrers in online collaboration services

B Kaleli, M Egele, G Stringhini - Detection of Intrusions and Malware, and …, 2019 - Springer
Online collaboration services (OCS) are appealing since they provide ease of access to
resources and the ability to collaborate on shared files. Documents on these services are …

Measuring and Improving the Security of the Web

B Kaleli - 2025 - search.proquest.com
As technology advances, people increasingly rely on websites for various aspects of their
lives, such as shop** and banking. To meet user demands, Web application developers …

[PDF][PDF] How trustworthy is the Trusted Digital Identity Framework?

B Frengley - 2020 - bfrengley.github.io
Abstract The Trusted Digital Identity Framework (TDIF) is a digital identity management
system recently released by the Australian government. It features a brokered model in …