Account hijacking threat attack detection for OAuth2.0 authorization API
OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnera...
Saved in:
Main Authors: | Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019144/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
by: Jeongseok Choi, et al.
Published: (2016-03-01) -
Overview of control-flow hijacking attack and defense techniques for process
by: Fengfeng WANG, et al.
Published: (2019-12-01) -
THEORETICAL ASPECTS REGARDING THE APPLICATION OF TREATIES IN TIME AND SPACE
by: Roxana-Mariana POPESCU
Published: (2023-06-01) -
Enhancing identity and access management using Hyperledger Fabric and OAuth 2.0: A block-chain-based approach for security and scalability for healthcare industry
by: Shrabani Sutradhar, et al.
Published: (2024-01-01) -
Method against process control-flow hijacking based on mimic defense
by: Chuanxing PAN, et al.
Published: (2021-01-01)