2011 IEEE Symposium on Security and Privacy 2011
DOI: 10.1109/sp.2011.26
|View full text |Cite
|
Sign up to set email alerts
|

How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores

Abstract: Abstract-Web applications increasingly integrate third-party services. The integration introduces new security challenges due to the complexity for an application to coordinate its internal states with those of the component services and the web client across the Internet. In this paper, we study the security implications of this problem to merchant websites that accept payments through third-party cashiers (e.g., PayPal, Amazon Payments and Google Checkout), which we refer to as Cashier-as-a-Service or CaaS. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
50
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(50 citation statements)
references
References 20 publications
(20 reference statements)
0
50
0
Order By: Relevance
“…the primary merits include: (1) clients exclusively should enroll at the enlistment focus once and will utilize admissible administrations in qualified servers; (2) the subject doesn't need a check table; (3) clients will unreservedly settle on their passwords; (4) the calculation and correspondence esteem is to a great degree low; (5) servers and clients can confirm each other; (6) it creates a session enter in understanding by the client and in this way the server; (7) it's a nonce-based topic that doesn't have an overwhelming time-synchronization [15] disadvantage.…”
Section: Related Workmentioning
confidence: 99%
“…the primary merits include: (1) clients exclusively should enroll at the enlistment focus once and will utilize admissible administrations in qualified servers; (2) the subject doesn't need a check table; (3) clients will unreservedly settle on their passwords; (4) the calculation and correspondence esteem is to a great degree low; (5) servers and clients can confirm each other; (6) it creates a session enter in understanding by the client and in this way the server; (7) it's a nonce-based topic that doesn't have an overwhelming time-synchronization [15] disadvantage.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [27] discovered logic vulnerabilities within the checkout procedures, which can be exploited by the attackers to shop for free. Its further research [28] also identified logic vulnerabilities within web-based single-sign-on services.…”
Section: Related Workmentioning
confidence: 99%
“…With the goal of confirming the real dangers that logic vulnerabilities in e-commerce applications pose, we designed responsible proof-of-concept experiments following the example set by Wang et al [30]. Each experiment was performed on a live website that used a vulnerable payment module.…”
Section: Introductionmentioning
confidence: 99%
“…Each technique targets a particular domain of logic vulnerabilities and checks web applications against specifications in the given domain. Wang et al [30,33] are the first to perform security analysis on Cashier-as-aService based e-commerce applications. They found several serious logic vulnerabilities in a few popular e-commerce applications via manual code reviews [30] and proposed a proxybased approach to dynamically secure third-party web service integrations which include the integration of cashiers [33].…”
Section: Introductionmentioning
confidence: 99%