A Logic-Based Reasoner for Discovering Authentication Vulnerabilities Between Interconnected Accounts.
Erisa KarafiliDaniele SgandurraEmil LupuPublished in: ETAA@ESORICS (2018)
Keyphrases
- security mechanisms
- information security
- knowledge base
- authentication mechanism
- meta reasoning
- query answering
- consistency checking
- knowledge representation
- authentication protocol
- security issues
- security requirements
- user authentication
- biometric authentication
- access control
- resource constrained
- identity authentication
- security vulnerabilities
- low cost
- virtual private network