Main Page: Difference between revisions
No edit summary |
No edit summary |
||
Line 32: | Line 32: | ||
Attacks primarily violating the security objective '''"Integrity"''' | Attacks primarily violating the security objective '''"Integrity"''' | ||
*[[:Token_Recipient_Confusion]] | *[[:Token_Recipient_Confusion]] | ||
If you have any questions or comments feel free to contact us! | If you have any questions or comments feel free to contact us! | ||
[[https://www.nds.ruhr-uni-bochum.de]] | [[https://www.nds.ruhr-uni-bochum.de]] |
Revision as of 17:36, 14 January 2016
Welcome to SSO-Attacks
SSO-Attacks.org was created by the Chair for Network and Data Security at Ruhr University Bochum, Germany [[1]]. Research and development at the Chair for Network and Data Security concentrates on cryptographic protocols, Internet security and XML security.
SSO-Attacks.org aims at delivering the most comprehensive enumeration of all known single sign-on attacks. All attacks are categorised and structured in a stringent fashion. Depending on your viewpoint, you can choose to have attacks listed by one of the following categories:
- Attack Categorisation by attacker model
- Attack Categorisation by attack on IdP/SP
- Attack Categorisation by violated security objective
- Attack Categorisation by attacked web service component
- Attack Categorisation by attack spreading
- Attack Categorisation by attack on SAML
Alternatively, you can browse through the entire list of attacks (sorted by violated security objective):
Attacks primarily violating the security objective "Access Control"
Attacks primarily violating the security objective "Availability"
Attacks primarily violating the security objective "Confidentiality"
Attacks primarily violating the security objective "Integrity"
If you have any questions or comments feel free to contact us! [[2]]