An empirical study of oauth-based SSO system on web

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

More and more websites use OAuth 2.0 protocol to provide SSO services to ease password management for users. Although OAuth 2.0 has been implemented carefully by following many guidelines, still some parts have been ignored. In this paper, we discover a new attack mode for hijacking the account in the OAuth-based SSO system. We conduct an empirical study for the proposed attack on top 500 Chinese websites of Alexa supporting SSO services by 6 IdPs. Our results uncover four vulnerabilities that allow attackers hijack the victim’s account without knowing the user’s username and password. Closer examination reveals that 68.67%, 12.87%, 68.67% and 59.66% of the websites are vulnerable to the four vulnerabilities respectively and 45.49% of the websites can be conducted proposed complete attack. To defend this attack, we provide developers simple practical recommendations to the critical vulnerable nodes.

Author supplied keywords

Cite

CITATION STYLE

APA

Qiu, K., Liu, Q., Liu, J., Yu, L., & Wang, Y. (2018). An empirical study of oauth-based SSO system on web. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10874 LNCS, pp. 400–411). Springer Verlag. https://doi.org/10.1007/978-3-319-94268-1_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free