Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of the libraries that service providers widely use. In this […]
Continue.. Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations