Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations.
Athanasios Vasileios GrammatopoulosIlias PolitisChristos XenakisPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2022)
Keyphrases
- computer systems
- software tools
- risk assessment
- access control
- security vulnerabilities
- source code
- computer security
- security issues
- security policies
- information security
- software systems
- efficient implementation
- statistical databases
- software design
- enterprise systems
- software implementation
- security risks
- software architecture
- intrusion detection
- security requirements
- software development
- information systems
- software process improvement
- protocol specification