[HTML][HTML] Bridging the gap: A survey and classification of research-informed Ethical Hacking tools

P Modesti, L Golightly, L Holmes, C Opara… - Journal of Cybersecurity …, 2024 - mdpi.com
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …

SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements

L Jannett, C Mainka, M Westers… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …

Exploring the Landscape of Website Vulnerability Scanners: A Comprehensive Review and Comparative Analysis

HM Zangana - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter provides a comprehensive analysis of web application vulnerability scanners,
examining their characteristics, effectiveness, and implications for web security. Through a …

A highly interactive honeypot-based approach to network threat management

X Yang, J Yuan, H Yang, Y Kong, H Zhang, J Zhao - Future Internet, 2023 - mdpi.com
In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …

DISTINCT: identity theft using in-browser communications in dual-window single sign-on

L Jannett, V Mladenov, C Mainka… - Proceedings of the 2022 …, 2022 - dl.acm.org
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …

SSO-monitor: fully-automatic large-scale landscape, security, and privacy analyses of single sign-on in the wild

M Westers, T Wich, L Jannett, V Mladenov… - arxiv preprint arxiv …, 2023 - arxiv.org
Single Sign-On (SSO) shifts the crucial authentication process on a website to to the
underlying SSO protocols and their correct implementation. To strengthen SSO security …

Test Case Generation for Access Control Based on UML Activity Diagram

A Fan, L Liao, L Wang, B Li - 2024 IEEE 24th International …, 2024 - ieeexplore.ieee.org
Access control is a vital component of information system security, ensuring that resources
are only accessible to authorized users with specific permissions. However, traditional …

BeHAutH: A KNN-based classification scheme for behavior-based authentication in web 3.0

P Bhattacharya, C Trivedi, MS Obaidat… - 2022 International …, 2022 - ieeexplore.ieee.org
Web 3.0 would allow users and processes to communicate and interpret data semantically. It
is expected to employ web user (WU) behaviour data, which is sampled and collected at …

[PDF][PDF] Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps.

M Bilal, SC Showngwe, A Bashir… - Computers, Materials & …, 2023 - researchgate.net
To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a
challenging task nowadays. For this purpose, authentication protocol plays a vital role in …

Automated Security Testing for Identity Management of Large-scale Digital Infrastructures

A Bisegna - 2023 - tesidottorato.depositolegale.it
Ensuring the security of an organization's digital assets against cyber threats is critical in
today's technology-driven world. Regular security testing is one of the measures that can …