A research of security in website account binding
More and more websites have allowed users to bind a third-party account, mobile phone or email address. Users can log in to different websites through the bound third-party account or mobile phone, or recover password via the bound email address. So security issues in the binding process should be h...
Gespeichert in:
Veröffentlicht in: | Journal of information security and applications 2020-04, Vol.51, p.102444, Article 102444 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | More and more websites have allowed users to bind a third-party account, mobile phone or email address. Users can log in to different websites through the bound third-party account or mobile phone, or recover password via the bound email address. So security issues in the binding process should be highly valued. In this article, we investigated the security in the account binding process. We designed three attack models for different account binding methods, which are OAuth based third-party account binding, Quick Response Code (QR code) based third-party account binding, and mobile phone/email address binding. We assessed the risk of these three attacks on 43 selected websites. According to our assessment results, 11 websites have vulnerabilities in third-party account binding, 4 websites have vulnerabilities in mobile phone or email address binding. To alleviate the possible hazards, we provided defensive measures for each stage of account binding. |
---|---|
ISSN: | 2214-2126 |
DOI: | 10.1016/j.jisa.2019.102444 |