Back to Search Start Over

Discovering concrete attacks on website authorization by formal analysis

Authors :
Bansal, Chetan
Bhargavan, Karthikeyan
Delignat-Lavaud, Antoine
Maffeis, Sergio
BITS Pilani Goa Campus
Programming securely with cryptography (PROSECCO)
Inria Paris-Rocquencourt
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
Department of Computing [London]
Biomedical Image Analysis Group [London] (BioMedIA)
Imperial College London-Imperial College London
Source :
Journal of Computer Security, Journal of Computer Security, IOS Press, 2014, 22 (4), pp.601-657. ⟨10.3233/JCS-140503⟩, Journal of Computer Security, 2014, 22 (4), pp.601-657. ⟨10.3233/JCS-140503⟩
Publication Year :
2014
Publisher :
HAL CCSD, 2014.

Abstract

International audience; Social sign-on and social sharing are becoming an ever more popular feature of web applications. This success is largely due to the APIs and support offered by prominent social networks, such as Facebook, Twitter and Google, on the basis of new open standards such as the OAuth 2.0 authorization protocol. A formal analysis of these protocols must account for malicious websites and common web application vulnerabilities, such as cross-site request forgery and open redirectors. We model several configurations of the OAuth 2.0 protocol in the applied pi-calculus and verify them using ProVerif. Our models rely on WebSpi, a new library for modeling web applications and web-based attackers that is designed to help discover concrete attacks on websites. To ease the task of writing formal models in our framework, we present a model extraction tool that automatically translates programs written in subsets of PHP and JavaScript to the applied pi-calculus. Our approach is validated by finding dozens of previously unknown vulnerabilities in popular websites such as Yahoo and WordPress, when they connect to social networks such as Twitter and Facebook.

Details

Language :
English
ISSN :
0926227X and 18758924
Database :
OpenAIRE
Journal :
Journal of Computer Security, Journal of Computer Security, IOS Press, 2014, 22 (4), pp.601-657. ⟨10.3233/JCS-140503⟩, Journal of Computer Security, 2014, 22 (4), pp.601-657. ⟨10.3233/JCS-140503⟩
Accession number :
edsair.dedup.wf.001..e65ccb06d68108323186dd19b1361ffc
Full Text :
https://doi.org/10.3233/JCS-140503⟩