Verifying OAuth Implementations Through Encrypted Network Analysis

TitleVerifying OAuth Implementations Through Encrypted Network Analysis
Publication TypeConference Paper
Year of Publication2019
AuthorsTalkington, J, Dantu, R, Morozov, K
Conference NameProceedings of the 24th ACM Symposium on Access Control Models and Technologies
PublisherAssociation for Computing Machinery
Conference LocationNew York, NY, USA
ISBN Number9781450367530
KeywordsAndroid, authorization, formal models, network analysis, oauth
Abstract

Verifying protocol implementations via application analysis can be cumbersome. Rapid development cycles of both the protocol and applications that use it can hinder up-to-date analysis. A better approach is to use formal models to characterize the applications platform and then verify the protocol through analysis of the network traffic tied to the models. To test this method, the popular protocol OAuth is considered. Currently, formal models of OAuth do not take into consideration the mobile environment, and implementation verification is largely based on code analysis. Our preliminary results are two fold; we sketch an extension to a formal model that incorporates the specifics of the Android platform and classify OAuth device types using machine learning on encrypted VPN traffic.

URLhttps://doi.org/10.1145/3322431.3326449
DOI10.1145/3322431.3326449

Publication Status:

UNT Department:

UNT Center:

UNT Lab: