[HTML][HTML] Bridging the gap: A survey and classification of research-informed Ethical Hacking tools
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …
practitioners within the industry or underground communities. Similarly, academic …
SoK: SSO-MONITOR-The Current State and Future Research Directions in Single Sign-on Security Measurements
Single Sign-On (SSO) with OAuth 2.0 and OpenID Connect 1.0 is essential for user
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
authentication and autho-rization on the Internet. Billions of users rely on SSO services …
Exploring the Landscape of Website Vulnerability Scanners: A Comprehensive Review and Comparative Analysis
HM Zangana - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter provides a comprehensive analysis of web application vulnerability scanners,
examining their characteristics, effectiveness, and implications for web security. Through a …
examining their characteristics, effectiveness, and implications for web security. Through a …
A highly interactive honeypot-based approach to network threat management
X Yang, J Yuan, H Yang, Y Kong, H Zhang, J Zhao - Future Internet, 2023 - mdpi.com
In this paper, considering the problem that the common defensive means in the current
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …
cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn …
DISTINCT: identity theft using in-browser communications in dual-window single sign-on
Single Sign-On (SSO) protocols like OAuth 2.0 and OpenID Connect 1.0 are cornerstones of
modern web security, and have received much academic attention. Users sign in at a trusted …
modern web security, and have received much academic attention. Users sign in at a trusted …
SSO-monitor: fully-automatic large-scale landscape, security, and privacy analyses of single sign-on in the wild
M Westers, T Wich, L Jannett, V Mladenov… - arxiv preprint arxiv …, 2023 - arxiv.org
Single Sign-On (SSO) shifts the crucial authentication process on a website to to the
underlying SSO protocols and their correct implementation. To strengthen SSO security …
underlying SSO protocols and their correct implementation. To strengthen SSO security …
Test Case Generation for Access Control Based on UML Activity Diagram
A Fan, L Liao, L Wang, B Li - 2024 IEEE 24th International …, 2024 - ieeexplore.ieee.org
Access control is a vital component of information system security, ensuring that resources
are only accessible to authorized users with specific permissions. However, traditional …
are only accessible to authorized users with specific permissions. However, traditional …
BeHAutH: A KNN-based classification scheme for behavior-based authentication in web 3.0
Web 3.0 would allow users and processes to communicate and interpret data semantically. It
is expected to employ web user (WU) behaviour data, which is sampled and collected at …
is expected to employ web user (WU) behaviour data, which is sampled and collected at …
[PDF][PDF] Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps.
To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a
challenging task nowadays. For this purpose, authentication protocol plays a vital role in …
challenging task nowadays. For this purpose, authentication protocol plays a vital role in …
Automated Security Testing for Identity Management of Large-scale Digital Infrastructures
A Bisegna - 2023 - tesidottorato.depositolegale.it
Ensuring the security of an organization's digital assets against cyber threats is critical in
today's technology-driven world. Regular security testing is one of the measures that can …
today's technology-driven world. Regular security testing is one of the measures that can …