Token Recipient Confusion
From Single Sign-On Attacks
Revision as of 16:37, 14 January 2016 by Anna (Created page with "=Attack description= =Attack subtypes= =Prerequisites for attack= =Graphical representation of attack= =Attack example= =Attack mitigation / countermeasures= =Prac...")
Prerequisites for attack
Graphical representation of attack
Attack mitigation / countermeasures
Practical Attack Examples
C. Mainka, V. Mladenov, F. Feldmann, J. Krautwald, J. Schwenk (2014): Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. In The ACM Cloud Computing Security Workshop (CCSW).