Main Page: Difference between revisions

From Single Sign-On Attacks
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
='''Welcome to SSO-Attacks!'''=
=Welcome to SSO-Attacks=


SSO-Attacks.org was created by the Chair for Network and Data Security at Ruhr University Bochum, Germany [[http://www.ruhr-uni-bochum.de]]. Re­se­arch and de­ve­lop­ment at the Chair for Net­work and Data Se­cu­ri­ty con­cen­tra­tes on cryp­to­gra­phic pro­to­cols, In­ter­net se­cu­ri­ty and XML se­cu­ri­ty.
SSO-Attacks.org was created by the Chair for Network and Data Security at Ruhr University Bochum, Germany [[http://www.ruhr-uni-bochum.de]]. Re­se­arch and de­ve­lop­ment at the Chair for Net­work and Data Se­cu­ri­ty con­cen­tra­tes on cryp­to­gra­phic pro­to­cols, In­ter­net se­cu­ri­ty and XML se­cu­ri­ty.

Revision as of 16:21, 14 January 2016

Welcome to SSO-Attacks

SSO-Attacks.org was created by the Chair for Network and Data Security at Ruhr University Bochum, Germany [[1]]. Re­se­arch and de­ve­lop­ment at the Chair for Net­work and Data Se­cu­ri­ty con­cen­tra­tes on cryp­to­gra­phic pro­to­cols, In­ter­net se­cu­ri­ty and XML se­cu­ri­ty.


SSO-Attacks.org aims at delivering the most comprehensive enumeration of all known single sign-on attacks. All attacks are categorised and structured in a stringent fashion. Depending on your viewpoint, you can choose to have attacks listed by one of the following categories:


Alternatively, you can browse through the entire list of attacks (sorted by violated security objective):


Attacks primarily violating the security objective "Access Control"

Attacks primarily violating the security objective "Confidentiality"


If you have any questions or comments feel free to contact us! [[2]]