Token Recipient Confusion

From Single Sign-On Attacks
Revision as of 16:37, 14 January 2016 by Anna (talk | contribs) (Created page with "=Attack description= =Attack subtypes= =Prerequisites for attack= =Graphical representation of attack= =Attack example= =Attack mitigation / countermeasures= =Prac...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Attack description

Attack subtypes

Prerequisites for attack

Graphical representation of attack

Attack example

Attack mitigation / countermeasures

Practical Attack Examples

References

C. Mainka, V. Mladenov, F. Feldmann, J. Krautwald, J. Schwenk (2014): Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. In The ACM Cloud Computing Security Workshop (CCSW).