A Comprehensive Formal Security Analysis of OAuth 2.0

A Comprehensive Formal Security Analysis of OAuth 2.0

ACM CCS via YouTube Direct link

Limitations

7 of 22

7 of 22

Limitations

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Comprehensive Formal Security Analysis of OAuth 2.0

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Our Contributions
  3. 3 Formal Analysis of Web Applications and Standards
  4. 4 Sources
  5. 5 Web Model
  6. 6 Web Browser Model
  7. 7 Limitations
  8. 8 Previous Work
  9. 9 OAuth Modes
  10. 10 Multiple IdPs
  11. 11 Authorization Property
  12. 12 Authentication Property
  13. 13 Session Integrity Property
  14. 14 Attacks: Overview
  15. 15 307 Redirect Attack
  16. 16 IdP Mix-Up Attack in implicit Mode
  17. 17 IdP Mix-Up Attack: Mitigation
  18. 18 Impact
  19. 19 Proof: Assumptions
  20. 20 Session Integrity: Network Attacker
  21. 21 OAuth 2.0: Security Proof
  22. 22 Some Related Work

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.