Account hijacking threat attack detection for OAuth2.0 authorization API

OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnera...

Full description

Bibliographic Details
Published in:Tongxin xuebao
Main Authors: Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU
Format: Article
Language:Chinese
Published: Editorial Department of Journal on Communications 2019-06-01
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019144/