2014
DOI: 10.1007/978-3-319-13257-0_34
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues in OAuth 2.0 SSO Implementations

Abstract: Abstract. Many Chinese websites (relying parties) use OAuth 2.0 as the basis of a single sign-on service to ease password management for users. Many sites support five or more different OAuth 2.0 identity providers, giving users choice in their trust point. However, although OAuth 2.0 has been widely implemented (particularly in China), little attention has been paid to security in practice. In this paper we report on a detailed study of OAuth 2.0 implementation security for ten major identity providers and 60… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3

Relationship

3
6

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…In [41], Sun and Beznosov analyze the security of three IdPs and 96 RPs. In [28], Li and Mitchell study the security of 10 IdPs and 60 RPs based in China. In [43], Yang et al perform an automated analysis of 4 OAuth IdPs and 500 RPs.…”
Section: Related Workmentioning
confidence: 99%
“…In [41], Sun and Beznosov analyze the security of three IdPs and 96 RPs. In [28], Li and Mitchell study the security of 10 IdPs and 60 RPs based in China. In [43], Yang et al perform an automated analysis of 4 OAuth IdPs and 500 RPs.…”
Section: Related Workmentioning
confidence: 99%
“…It should contain a nonce that is bound to the user's session. Attacks that can result from omitting or incorrectly using state were described in the context of OAuth 2.0 in [8], [35], [37], [44].…”
Section: A Attacks Mitigations and Guidelinesmentioning
confidence: 99%
“…In parallel, Sun and Beznosov [22] also studied deployed OAuth 2.0 systems. Later, Li and Mitchell [13] examined the security of deployed OAuth 2.0 systems providing services in Chinese. In parallel, Zhou and Evans [25] conducted a large scale study of the security of Facebook's OAuth 2.0 implementation.…”
Section: Analysing the Security Of Oauth 20 And Openid Connectmentioning
confidence: 99%
“…The impact of such an attack depends on the type of resource accessed. For example, the user might upload private data to the RP, thinking it is uploading information to its own profile at this RP, and this data will subsequently be available to the attacker; as described by Li and Mitchell [13], an attacker can use a CSRF attack to control a victim user's RP account without knowing the user's username and password.…”
Section: Csrf Attacks Against the Redirect Urimentioning
confidence: 99%