2014
DOI: 10.21236/ada614474
|View full text |Cite
|
Sign up to set email alerts
|

The Emperor's New Password Manager: Security Analysis of Web-based Password Managers

Abstract: Synthesis is the problem of obtaining programs from relational specifications. We present grammar-modular (GM) synthesis, an algorithm for synthesis from tree-structured relational specifications. GM synthesis makes synthesis applicable to previously intractable relational specifications by decomposing them into smaller subproblems, which can be tackled in isolation by off-the-shelf synthesis procedures. The program fragments thus generated are subsequently composed to form a program satisfying the overall spe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
81
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 99 publications
(89 citation statements)
references
References 37 publications
1
81
0
Order By: Relevance
“…In regard to the latter scenario, there are some future research lines that would boost the adoption of PMs, namely: investigation on how to automatically integrate and enforce company security policies with PMs; combination with SSO technologies highly used inside corporate environments, such as SAML and OAuth; and research on usability improvements by merging implicit authentication with PMs as mechanisms for substituting the Mast er Key. Finally, as future work we would like to develop automatic testing tools that evaluate the security of PMs empirically in order to complement the theoretical analysis given in this paper and cover specific attack scenarios and vulnerabilities as described in [11] .…”
Section: Conclusion and Future Linesmentioning
confidence: 99%
“…In regard to the latter scenario, there are some future research lines that would boost the adoption of PMs, namely: investigation on how to automatically integrate and enforce company security policies with PMs; combination with SSO technologies highly used inside corporate environments, such as SAML and OAuth; and research on usability improvements by merging implicit authentication with PMs as mechanisms for substituting the Mast er Key. Finally, as future work we would like to develop automatic testing tools that evaluate the security of PMs empirically in order to complement the theoretical analysis given in this paper and cover specific attack scenarios and vulnerabilities as described in [11] .…”
Section: Conclusion and Future Linesmentioning
confidence: 99%
“…These extensions allow the password manager to auto login and auto-populate authentication details to reduce the chances of attacks that involve user participation [9].…”
Section: Background a Password Managersmentioning
confidence: 99%
“…Li et al [9] analysed the security of five cloud-based password managers focusing on protocols used for authentication to a Web application, sharing of passwords with collaborators, encryption and login bookmarklets. They found vulnerabilities related to authorisation, user interface, bookmarklets, and susceptibility to cross-site request forgery and cross-site scripting (XSS) attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A bookmarklet is a bookmark, which essentially contains JavaScript code, in order to add previously unobtainable features, in a browser. While this on the surface seems like a nifty feature, work in [12] discusses an attack on LastPass, exploiting the users bookmarklet, to gain access to virtually all of the users stored credentials. Finally, it is work mentioning that there has been a recent leak from LastPass [25], that leads to even more users to look suspicious of their services.…”
Section: Toolsmentioning
confidence: 99%