Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect

01/24/2018
by   Wanpeng Li, et al.
0

Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0 and/or OpenID Connect-based single sign on. The security of OAuth 2.0 and OpenID Connect is therefore of critical importance, and it has been widely examined both in theory and in practice. Unfortunately, as these studies have shown, real-world implementations of both schemes are often vulnerable to attack, and in particular to cross-site request forgery (CSRF) attacks. In this paper we propose a new technique which can be used to mitigate CSRF attacks against both OAuth 2.0 and OpenID Connect.

READ FULL TEXT

page 2

page 3

research
01/24/2019

OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

Millions of users routinely use Google to log in to websites supporting ...
research
04/13/2022

On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's Channel Theory

In security analysis, attack trees are a major tool for showing the stru...
research
06/24/2018

WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring

We present WPSE, a browser-side security monitor for web protocols desig...
research
11/13/2018

Detection and Prevention Against RTS Attacks in Wireless LAN

Widely deployed wireless network devices use a shared medium to communic...
research
09/09/2022

SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences

The number of login options on websites has increased since the introduc...
research
07/18/2023

Mitigating Intersection Attacks in Anonymous Microblogging

Anonymous microblogging systems are known to be vulnerable to intersecti...
research
07/23/2020

Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool

Tor is the most well-known tool for circumventing censorship. Unfortunat...

Please sign up or login with your details

Forgot password? Click here to reset