Threat Modelling in User Performed Authentication

  • Authors:
  • Xun Dong;John A. Clark;Jeremy L. Jacob

  • Affiliations:
  • Department of Computer Science, University of York, United Kingdom;Department of Computer Science, University of York, United Kingdom;Department of Computer Science, University of York, United Kingdom

  • Venue:
  • ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

User authentication can be compromised both by subverting the system and by subverting the user; the threat modelling of the former is well studied, the latter less so. We propose a method to determine opportunities to subvert the user allowing vulnerabilities to be systematically identified. The method is applied to VeriSign's OpenID authentication mechanism.