Certificate Injection

From Single Sign-On Attacks
Revision as of 17:46, 2 February 2016 by Anna (talk | contribs) (Created page with "=Introduction= =Attack subtypes= =Prerequisites= =Target= =Description= =Mitigation / Countermeasures= =Practical Examples= =References= C. Mainka, V. Mladenov, F. Feld...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Introduction

Attack subtypes

Prerequisites

Target

Description

Mitigation / Countermeasures

Practical Examples

References

C. Mainka, V. Mladenov, F. Feldmann, J. Krautwald, J. Schwenk (2014): Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. In The ACM Cloud Computing Security Workshop (CCSW).