Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Surviving the web: A journey into web session security

S Calzavara, R Focardi, M Squarcina… - ACM Computing Surveys …, 2017 - dl.acm.org
In this article, we survey the most common attacks against web sessions, that is, attacks that
target honest web browser users establishing an authenticated session with a trusted web …

A comprehensive formal security analysis of OAuth 2.0

D Fett, R Küsters, G Schmitz - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …

Discovering concrete attacks on website authorization by formal analysis

C Bansal, K Bhargavan… - Journal of Computer …, 2014 - content.iospress.com
Social sign-on and social sharing are becoming an ever more popular feature of web
applications. This success is largely due to the APIs and support offered by prominent social …

The web sso standard openid connect: In-depth formal security analysis and security guidelines

D Fett, R Küsters, G Schmitz - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …

An expressive model for the web infrastructure: Definition and application to the browser id sso system

D Fett, R Küsters, G Schmitz - 2014 IEEE Symposium on …, 2014 - ieeexplore.ieee.org
The web constitutes a complex infrastructure and, as demonstrated by numerous attacks,
rigorous analysis of standards and web applications is indispensable. Inspired by successful …

Spresso: A secure, privacy-respecting single sign-on system for the web

D Fett, R Küsters, G Schmitz - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Single sign-on (SSO) systems, such as OpenID and OAuth, allow web sites, so-called
relying parties (RPs), to delegate user authentication to identity providers (IdPs), such as …

[HTML][HTML] Formal methods for web security

M Bugliesi, S Calzavara, R Focardi - … of Logical and Algebraic Methods in …, 2017 - Elsevier
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …

CVSS: A cost-efficient and QoS-aware video streaming using cloud services

X Li, MA Salehi, M Bayoumi… - 2016 16th IEEE/ACM …, 2016 - ieeexplore.ieee.org
Video streams, either in form of on-demand streaming or live streaming, usually have to be
converted (ie, transcoded) based on the characteristics of clients' devices (eg, spatial …

Security evaluation of the OAuth 2.0 framework

E Ferry, JO Raw, K Curran - Information & Computer Security, 2015 - emerald.com
Purpose–The interoperability of cloud data between web applications and mobile devices
has vastly improved over recent years. The popularity of social media, smartphones and …