Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23008
|View full text |Cite
|
Sign up to set email alerts
|

Hardening Persona – Improving Federated Web Login

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(16 citation statements)
references
References 13 publications
1
14
0
Order By: Relevance
“…Dietz and Wallach demonstrated a technique to secure BrowserID when specific flaws in TLS are considered that break the confidentiality and integrity of TLS [DW14]. They describe an attack scenario in which the adversary acts as a man-in-the-middle between a browser and an IdP.…”
Section: Related Workmentioning
confidence: 99%
“…Dietz and Wallach demonstrated a technique to secure BrowserID when specific flaws in TLS are considered that break the confidentiality and integrity of TLS [DW14]. They describe an attack scenario in which the adversary acts as a man-in-the-middle between a browser and an IdP.…”
Section: Related Workmentioning
confidence: 99%
“…This tool-based analysis did not reveal the identity injection attack, though; privacy properties have not been studied there. Dietz and Wallach demonstrated a technique to secure BrowserID when specific flaws in TLS are considered [12].…”
Section: Related Workmentioning
confidence: 99%
“…An HTTP GET request for the URL http://example.com/show?index=1 is shown in (12), with an Origin header and a body that contains foo, bar . A possible response is shown in (13), which contains an httpOnly cookie with name SID and value n 2 as well as the string representation somescript of the scripting process script −1 (somescript) (which should be an element of S) and its initial state x.…”
Section: B5 Http Messagesmentioning
confidence: 99%
“…Token Binding [61] (formerly TLS ChannelID [3] and Origin-Bound Certificates [15]) allows cryptographically binding tokens (e.g., session cookies, access tokens sent from IdPs to SPs via the user's browser) to browsers using client-side dynamically generated TLS certificates [29]. Token binding can be applied across different SSO protocols to defend against various token theft attacks (such as session cookie theft or identity assertion reuse), e.g., Dietz et al [16] implement token binding for Mozilla Persona, and FIDO UAF [4] supports it as an optional feature (for backwardscompatibility with platforms that do not yet support token binding).…”
Section: Introductionmentioning
confidence: 99%