Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23286
|View full text |Cite
|
Sign up to set email alerts
|

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications

Abstract: Abstract-The advent of Software-as-a-Service (SaaS) has led to the development of multi-party web applications (MPWAs). MPWAs rely on core trusted third-party systems (e.g., payment servers, identity providers) and protocols such as Cashier-as-aService (CaaS), Single Sign-On (SSO) to deliver business services to users. Motivated by the large number of attacks discovered against MPWAs and by the lack of a single general-purpose application-agnostic technique to support their discovery, we propose an automatic t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Even though these works add towards test automation, complete automation of the security testing process remains a very active challenge. Recent works on XSS vulnerability detection include unit testing methods that can detect XSS vulnerabilities which cannot be found by static analysis tools [16] and attack patterns for black-box security testing of web applications [19].…”
Section: Related Workmentioning
confidence: 99%
“…Even though these works add towards test automation, complete automation of the security testing process remains a very active challenge. Recent works on XSS vulnerability detection include unit testing methods that can detect XSS vulnerabilities which cannot be found by static analysis tools [16] and attack patterns for black-box security testing of web applications [19].…”
Section: Related Workmentioning
confidence: 99%
“…As future work, we also plan to extend the analysis to other authentication factors, such as biometric traits. In addition, an interesting future direction could be to establish a collaboration with researchers focused on vulnerability detection of SSO and MFA protocols (e.g., [51,54,50,56] for OAuth and OIDC) in order to provide a…”
Section: Discussionmentioning
confidence: 99%
“…Further offensive testing approaches against web applications and networks can be found in Duchene et al (2014), Felderer et al (2016, Sudhodanan et al (2016), andShameli-Sendi et al (2017), respectively. A general introduction and analysis of model-based testing is elaborated in Krämer and Legeard (2016) .…”
Section: Related Workmentioning
confidence: 99%