Account hijacking threat attack detection for OAuth2.0 authorization API
OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnera...
| الحاوية / القاعدة: | Tongxin xuebao |
|---|---|
| المؤلفون الرئيسيون: | , , , , , |
| التنسيق: | مقال |
| اللغة: | الصينية |
| منشور في: |
Editorial Department of Journal on Communications
2019-06-01
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019144/ |
