Account hijacking threat attack detection for OAuth2.0 authorization API

OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnera...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Tongxin xuebao
المؤلفون الرئيسيون: Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU
التنسيق: مقال
اللغة:الصينية
منشور في: Editorial Department of Journal on Communications 2019-06-01
الموضوعات:
الوصول للمادة أونلاين:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019144/