OAUCH: Exploring Security Compliance in the OAuth 2.0 Ecosystem

被引:6
|
作者
Philippaerts, Pieter [1 ]
Preuveneers, Davy [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, imec DistriNet, Leuven, Belgium
关键词
ATTACKS;
D O I
10.1145/3545948.3545955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The OAuth 2.0 protocol is a popular and widely adopted authorization protocol. It has been proven secure in a comprehensive formal security analysis, yet new vulnerabilities continue to appear in popular OAuth implementations. This paper sets out to improve the security of the OAuth landscape by measuring how well individual identity providers (IdPs) implement the security specifications defined in the OAuth standard, and by providing detailed and targeted feedback to the operators to improve the compliance of their service. We present a tool, called OAuch, that tests and analyzes IdPs according to the guidelines of the OAuth standards and security best practices. We evaluate 100 publicly deployed OAuth IdPs using OAuch and aggregate the results to create a unique overview of the current state of practice in the OAuth ecosystem. We determine that, on average, an OAuth IdP does not implement 34% of the security specifications present in the OAuth standards, including 20% of the required specifications. We then validate the IdPs against the OAuth threat model. The analysis shows that 97 IdPs leave one or more threats completely unmitigated (with an average of 4 unmitigated threats per IdP). No IdPs fully mitigate all threats. We further validate the results by picking four attack vectors and using the tool's output to determine which IdPs to attack. The results were highly accurate, with a false positive rate of 1.45% and a false negative rate of 1.48% for the four attack vectors combined.
引用
收藏
页码:460 / 481
页数:22
相关论文
共 50 条
  • [41] Mitigating security stress: Exploring the contingent role of collaborative communication in enhancing information security compliance
    Hwang, Inho
    Seo, Ribin
    COMPUTERS & SECURITY, 2025, 151
  • [42] Exploring the Effect of Knowledge Transfer Practices on User Compliance to IS Security Practices
    Nicolas-Rocca, Tonia San
    Schooley, Benjamin
    Spears, Janine L.
    INTERNATIONAL JOURNAL OF KNOWLEDGE MANAGEMENT, 2014, 10 (02) : 62 - 78
  • [43] Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals
    Van Goethem, Tom
    Piessens, Frank
    Joosen, Wouter
    Nikiforakis, Nick
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 918 - 929
  • [44] OAuth2.0协议认证授权实现方案研究
    王力猛
    陈鹏
    杨小军
    电脑编程技巧与维护, 2015, (10) : 21 - 22+43
  • [45] AN AUTHENTICATION TECHNIQUE BASED ON OAUTH 2.0 PROTOCOL FOR INTERNET OF THINGS (IOT) NETWORK
    Khan, Jalaluddin
    Li, Jian Ping
    Ali, Ikram
    Parveen, Shadma
    Khan, Ghufran Ahmad
    Khalil, Mudassir
    Khan, Asif
    Ul Haq, Amin
    Shahid, Mohammad
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 160 - 165
  • [46] Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations
    Li, Wanpeng
    Mitchell, Chris J.
    Chen, Thomas
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 24 - 41
  • [47] Enhancing identity and access management using Hyperledger Fabric and OAuth 2.0: A block-chain-based approach for security and scalability for healthcare industry
    Sutradhar S.
    Karforma S.
    Bose R.
    Roy S.
    Djebali S.
    Bhattacharyya D.
    Internet of Things and Cyber-Physical Systems, 2024, 4 : 49 - 67
  • [48] 基于OAuth2.0的认证授权技术研究
    魏成坤
    刘向东
    石兆军
    信息网络安全, 2016, (09) : 6 - 11
  • [49] OAuth2.0协议形式化验证:使用AVISPA
    郭丹青
    计算机系统应用, 2014, 23 (11) : 196 - 202
  • [50] 基于OAuth 2.0扩展的客户端认证方案
    沈海波
    陈强
    陈勇昌
    计算机工程与设计, 2017, 38 (02) : 350 - 354