Journal on Communications ›› 2019, Vol. 40 ›› Issue (6): 40-50.doi: 10.11959/j.issn.1000-436x.2019144

• Topics: Network Attack, Defense and Security Metrics • Previous Articles     Next Articles

Account hijacking threat attack detection for OAuth2.0 authorization API

LIU Qixu1,2,QIU Kaili1,2,WANG Yiwen1,2,CHEN Yanhui1,2,CHEN Langping1,2,LIU Chaoge1,2()   

  1. 1 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
  • Revised:2019-05-22 Online:2019-06-25 Published:2019-07-04
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0801604);The National Key Research and Development Program of China(2016QY08D1602);Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences Program;Beijing Key Laboratory of Network Security and Protection Technology Program

Abstract:

OAuth2.0 protocol has been widely adopted to simplify user login to third-party applications,at the same time,existing risk of leaking user privacy data,what even worse,causing user accounts to be hijacked.An account hijacking attack model around authorization code was built by analyzing the vulnerabilities of the OAuth2.0 protocol.A vulnerable API identification method based on differential traffic analysis and an account hijacking verification method based on authorized authentication traffic monitoring was proposed.An account hijacking attack threat detection framework OScan for OAuth2.0 authorization API was designed and implemented.Through a large-scale detection of the 3 853 authorization APIs deployed on the Alexa top 10 000 websites,360 vulnerable APIs were discovered.The further verification showed that 80 websites were found to have threat of account hijacking attack.Compared with similar tools,OScan has significant advantages in covering the number of identity provider,the number of detected relying party,as well as the integrity of risk detection.

Key words: OAuth2.0 protocol, application programming interface, account hijacking, the third-party application

CLC Number: 

No Suggested Reading articles found!