Account hijacking threat attack detection for OAuth2.0 authorization API

OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnera...

Full description

Bibliographic Details
Main Authors: Qixu LIU, Kaili QIU, Yiwen WANG, Yanhui CHEN, Langping CHEN, Chaoge LIU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019144/