Threat Modelling in User Performed Authentication

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

User authentication can be compromised both by subverting the system and by subverting the user; the threat modelling of the former is well studied, the latter less so. We propose a method to determine opportunities to subvert the user allowing vulnerabilities to be systematically identified. The method is applied to VeriSign's OpenID authentication mechanism.

Original languageEnglish
Title of host publicationINFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS
EditorsL Chen, MD Ryan, G Wang
Place of PublicationBERLIN
PublisherSpringer
Pages49-64
Number of pages16
Volume5308 LNCS
ISBN (Print)978-3-540-88624-2
DOIs
Publication statusPublished - 2008
Event10th International Conference on Information and Communications Security - Birmingham
Duration: 20 Oct 200822 Oct 2008

Conference

Conference10th International Conference on Information and Communications Security
CityBirmingham
Period20/10/0822/10/08

Cite this