2011 International Conference on Communication Systems and Network Technologies 2011
DOI: 10.1109/csnt.2011.141
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of OAuth 2.0 Using Alloy Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
38
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(40 citation statements)
references
References 6 publications
1
38
0
1
Order By: Relevance
“…Pai et al [10] confirm a security issue described in the OAuth 2.0 Threat Model ([9] §4.1.1) using the Alloy framework [11]. Chari et al [12] analyse OAuth 2.0 in the Universal Composability Security framework [13], and show that OAuth 2.0 is secure if all communications links are SSL-protected.…”
Section: Background and Related Workmentioning
confidence: 88%
“…Pai et al [10] confirm a security issue described in the OAuth 2.0 Threat Model ([9] §4.1.1) using the Alloy framework [11]. Chari et al [12] analyse OAuth 2.0 in the Universal Composability Security framework [13], and show that OAuth 2.0 is secure if all communications links are SSL-protected.…”
Section: Background and Related Workmentioning
confidence: 88%
“…First, OpenID is vulnerable to cross-site request forgery (CSRF), which is one of the most common Web security threats [77]. OAuth, on the other hand, has been proven to be secure with regard to the protocol itself [78,79], but several severe security weaknesses have been found in specific implementations of OAuth [80,81], such as CSRF as with OpenID above [82]. The risk of an attacker fooling a user into entering their credentials into a fake website or following non-trustworthy links is known to increase with the use of OpenID, OAuth and similar solutions [18].…”
Section: Protocol Problemsmentioning
confidence: 99%
“…10 of [22]). Furthermore, threats related to injection attacks and the insufficient protection of credentials have also been investigated [12,4].…”
Section: Interoperability Security and Evolution Issuesmentioning
confidence: 99%
“…The use of formal specification and verification techniques is a major approach to discover flaws in protocols. [12] uses the specification language Alloy and a SAT solver to discover security counterexample. In [4], the authors use the π-calculus, the WebSpy library and the ProVerif checker to make explicit various attacks on the OAuth protocol.…”
Section: Related Workmentioning
confidence: 99%