Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Junki Yuasa 1 ; Taisho Sasada 1 ; 2 ; Christophe Kiennert 3 ; Gregory Blanc 3 ; Yuzo Taenaka 1 and Youki Kadobayashi 1

Affiliations: 1 Graduate School of Science and Technology, Nara Institute Science and Technology, Ikoma 630-0192, Japan ; 2 Research Fellow (PD) of the Japan Society for the Promotion of Science, Tokyo 102-0083, Japan ; 3 SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris, 91120 Palaiseau, France

Keyword(s): Access Control, User Authenticity, Single Sign-On, OpenID Connect, FIDO, Session Hijacking.

Abstract: In recent years, the adoption of Single Sign-On (SSO) has been progressing to reduce the burden of user account management in web services. In web services using OpenID Connect, a primary SSO protocol, the user is authenticated using an ID Token (IDT) issued by the identity provider. The Session Token (ST) generated after authentication is often used to authenticate subsequent requests. However, attackers can acquire victims’ IDT/ST through Cross-Site Scripting (XSS) or malicious browser extensions, enabling them to hijack sessions and impersonate victims. Related studies have proposed countermeasures against impersonation attacks using IDT/ST. Still, their effectiveness is limited against user-level malware (e.g., malicious browser extensions), making it impossible to prevent impersonation entirely. This study proposes OIPM (OpenID Connect Impersonation Prevention Mechanism) as a countermeasure to address the issue of impersonation using IDT/ST. Specifically, a unique private key is generated during user registration using FIDO, a passwordless authentication technology. This private key’s signature is verified during authentication to prevent impersonation, and a temporary private key generated at authentication is used for subsequent request verification. Additionally, post-authentication high-confidentiality operations require user verification through FIDO-based gestures such as fingerprints to ensure security against user-level malware. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 13.59.19.57

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yuasa, J., Sasada, T., Kiennert, C., Blanc, G., Taenaka, Y. and Kadobayashi, Y. (2024). OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect. In Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-709-2; ISSN 2184-7711, SciTePress, pages 674-679. DOI: 10.5220/0012757900003767

@conference{secrypt24,
author={Junki Yuasa and Taisho Sasada and Christophe Kiennert and Gregory Blanc and Yuzo Taenaka and Youki Kadobayashi},
title={OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT},
year={2024},
pages={674-679},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012757900003767},
isbn={978-989-758-709-2},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
TI - OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect
SN - 978-989-758-709-2
IS - 2184-7711
AU - Yuasa, J.
AU - Sasada, T.
AU - Kiennert, C.
AU - Blanc, G.
AU - Taenaka, Y.
AU - Kadobayashi, Y.
PY - 2024
SP - 674
EP - 679
DO - 10.5220/0012757900003767
PB - SciTePress