Token Recipient Confusion

From Single Sign-On Attacks
Revision as of 15:37, 14 January 2016 by Anna (talk | contribs) (Created page with "=Attack description= =Attack subtypes= =Prerequisites for attack= =Graphical representation of attack= =Attack example= =Attack mitigation / countermeasures= =Prac...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Attack description

Attack subtypes

Prerequisites for attack

Graphical representation of attack

Attack example

Attack mitigation / countermeasures

Practical Attack Examples

References

C. Mainka, V. Mladenov, F. Feldmann, J. Krautwald, J. Schwenk (2014): Your Software at my Service: Security Analysis of SaaS Single Sign-On Solutions in the Cloud. In The ACM Cloud Computing Security Workshop (CCSW).