Handout 2 Articles for Oral Reports in CompSci
Giovanni Russello,Clark Thomborson
2012-01-01
Abstract:Single sign-on (SSO) protocols allow one person to use the same login credentials for several organizations. Enterprises face increasing competitive pressure to position themselves with regard to SSO, yet the ramifications of a move to SSO are not fully understood. In this paper we discuss OpenID, a relatively new SSO protocol that is gaining traction on the web. We apply enterprise application modelling techniques to OpenID in order to obtain well-founded decision aids for enterprises: we show how published modelling approaches can be used to analyse risks in OpenID, and show that these can identify security problems with common OpenID practice. Finally, we propose analysis principles that condense important general insights of authentication modelling. [2] A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, “MockDroid: trading privacy for application functionality on smartphones,” in Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, ser. HotMobile ’11. New York, NY, USA: ACM, 2011, pp. 49–54. [Online]. Available: http://dx.doi.org.ezproxy.auckland.ac. nz/10.1145/2184489.2184500 Abstract. MockDroid is a modified version of the Android operating system which allows a user to ‘mock’ an application’s access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal MockDroid is a modified version of the Android operating system which allows a user to ‘mock’ an application’s access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Existing applications continue to work on MockDroid, possibly with reduced functionality, since existing applications are already written to tolerate resource failure, such as network unavailability or lack of a GPS signal. We demonstrate the practicality of our approach by successfully running a random sample of twentythree popular applications from the Android Market. [3] T. Bletsch, X. Jiang, and V. Freeh, “Mitigating code-reuse attacks with control-flow locking,” in Proceedings of the 27th Annual Computer Security Applications Conference, ser. ACSAC ’11. New York, NY, USA: ACM, 2011, pp. 353–362. [Online]. Available: http://doi.acm.org.ezproxy.auckland.ac.nz/10.1145/2076732.2076783 Abstract. Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with Code-reuse attacks are software exploits in which an attacker directs control flow through existing code with