Projects per year
Abstract
User authentication can be compromised both by subverting the system and by subverting the user; the threat modelling of the former is well studied, the latter less so. We propose a method to determine opportunities to subvert the user allowing vulnerabilities to be systematically identified. The method is applied to VeriSign's OpenID authentication mechanism.
Original language | English |
---|---|
Title of host publication | INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS |
Editors | L Chen, MD Ryan, G Wang |
Place of Publication | BERLIN |
Publisher | Springer |
Pages | 49-64 |
Number of pages | 16 |
Volume | 5308 LNCS |
ISBN (Print) | 978-3-540-88624-2 |
DOIs | |
Publication status | Published - 2008 |
Event | 10th International Conference on Information and Communications Security - Birmingham Duration: 20 Oct 2008 → 22 Oct 2008 |
Conference
Conference | 10th International Conference on Information and Communications Security |
---|---|
City | Birmingham |
Period | 20/10/08 → 22/10/08 |
Projects
- 1 Finished
-
Defending the weakest link - Intrusion via ...
Clark, J. A. (Principal investigator)
1/08/06 → 31/01/10
Project: Research project (funded) › Research