A research of security in website account binding

More and more websites have allowed users to bind a third-party account, mobile phone or email address. Users can log in to different websites through the bound third-party account or mobile phone, or recover password via the bound email address. So security issues in the binding process should be h...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of information security and applications 2020-04, Vol.51, p.102444, Article 102444
Hauptverfasser: Gao, Xi, Yu, Lei, He, Houhua, Wang, Xiaoyu, Wang, Yiwen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:More and more websites have allowed users to bind a third-party account, mobile phone or email address. Users can log in to different websites through the bound third-party account or mobile phone, or recover password via the bound email address. So security issues in the binding process should be highly valued. In this article, we investigated the security in the account binding process. We designed three attack models for different account binding methods, which are OAuth based third-party account binding, Quick Response Code (QR code) based third-party account binding, and mobile phone/email address binding. We assessed the risk of these three attacks on 43 selected websites. According to our assessment results, 11 websites have vulnerabilities in third-party account binding, 4 websites have vulnerabilities in mobile phone or email address binding. To alleviate the possible hazards, we provided defensive measures for each stage of account binding.
ISSN:2214-2126
DOI:10.1016/j.jisa.2019.102444