Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study

Pieter Philippaerts, D. Preuveneers, W. Joosen
{"title":"Revisiting OAuth 2.0 Compliance: A Two-Year Follow-Up Study","authors":"Pieter Philippaerts, D. Preuveneers, W. Joosen","doi":"10.1109/EuroSPW59978.2023.00064","DOIUrl":null,"url":null,"abstract":"OAuth 2.0 is a widely used authorization protocol that allows third-party access to an authorization service on behalf of a user. Like any security protocol, it requires careful implementation to ensure security. Previous research has thoroughly analyzed the security of the OAuth protocol, but popular deployments remain vulnerable due to incorrect or limited implementation of the standards. In our previous work, we introduced a tool called OAUCH to measure and improve compliance with the OAuth standards. We used the tool to measure the compliance of 100 OAuth implementations and created a unique overview of the state of practice within the OAuth ecosystem. This paper revisits these prior results and updates our measurements. We compare the latest results to the original baseline and identify changes in the ecosystem. Our analysis shows that IdPs have become more compliant in the past two years, but a substantial number still lack fundamental countermeasures.","PeriodicalId":220415,"journal":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EuroSPW59978.2023.00064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

OAuth 2.0 is a widely used authorization protocol that allows third-party access to an authorization service on behalf of a user. Like any security protocol, it requires careful implementation to ensure security. Previous research has thoroughly analyzed the security of the OAuth protocol, but popular deployments remain vulnerable due to incorrect or limited implementation of the standards. In our previous work, we introduced a tool called OAUCH to measure and improve compliance with the OAuth standards. We used the tool to measure the compliance of 100 OAuth implementations and created a unique overview of the state of practice within the OAuth ecosystem. This paper revisits these prior results and updates our measurements. We compare the latest results to the original baseline and identify changes in the ecosystem. Our analysis shows that IdPs have become more compliant in the past two years, but a substantial number still lack fundamental countermeasures.
重新审视OAuth 2.0合规性:一项为期两年的随访研究
OAuth 2.0是一种广泛使用的授权协议,它允许第三方代表用户访问授权服务。与任何安全协议一样,它需要仔细实现以确保安全性。以前的研究已经彻底分析了OAuth协议的安全性,但是由于标准的不正确或有限的实现,流行的部署仍然容易受到攻击。在我们之前的工作中,我们介绍了一个名为OAuth的工具来度量和改进OAuth标准的遵从性。我们使用该工具测量了100个OAuth实现的遵从性,并创建了OAuth生态系统中实践状态的独特概述。本文回顾了这些先前的结果并更新了我们的测量结果。我们将最新结果与原始基线进行比较,确定生态系统的变化。我们的分析表明,国内流离失所者在过去两年中变得更加顺从,但仍有相当数量的人缺乏根本的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信