Search Constraints
« Previous |
51 - 55 of 55
|
Next »
Number of results to display per page
Search Results
-
LAT Hologramm Software
User Collection- Description:
- Diese Software dient zum Erstellen computergenerierter Hologramme für die holographische Strahlformung von Laserstrahlen mittels Spatial Light Modulator. Zudem unterstützt die Software die Ansteuerung und Synchronisation der Laborhardware.
- Keyword:
- Laboratory Control and Hologram Calculation
- Publisher:
- Applied Laser Technologies, Ruhr University Bochum
- Language:
- German and English
- Date Created:
- 17.10.2024
- Resource Type:
- Software
0Collections1Works -
- Description:
- Single Sign-On (SSO) is an authentication process that allows users to access multiple services with a single set of login credentials. Although SSO improves the user experience, it poses challenges to developers to implement complex authentication protocols securely. External services, called brokers, simplify the integration of SSO. In this paper, we shed light on the emerging brokered SSO ecosystem, focusing on the security of the newly introduced actor, the broker. We systematically evaluate the landscape of brokered SSO, uncovering significant blind spots in previous research. Our study reveals that 25% of the websites with SSO integrate brokers for authentication, an area that has not been covered by any previous research. Through our comprehensive security evaluation, we identify three categories of threats associated with brokered SSO: (1) insufficient validation of redirect chains enabling injection attacks, (2) unauthorized data access enabling account takeovers, and (3) violations of security best current practices. We expose vulnerabilities in over 50 brokers, compromising the security of more than 2k websites. These findings represent only a lower bound of a critical situation, underscoring the urgent need for improved security measures and protocols to safeguard the integrity of brokered SSO systems.
- Keyword:
- Single Sign-On and Identity Broker
- Subject:
- IT Security, Single Sign-On, Authorization and Authentication, and Identity Brokers
- Publisher:
- Language:
- English
- Date Uploaded:
- 2024-10-02
- Date Modified:
- 2025-02-19
- License:
- MIT License
- Resource Type:
- Dataset
-
Artifacts: "Only as Strong as the Weakest Link": On the Security of Brokered Single Sign-On on the Web
User Collection- Description:
- Single Sign-On (SSO) is an authentication process that allows users to access multiple services with a single set of login credentials. Although SSO improves the user experience, it poses challenges to developers to implement complex authentication protocols securely. External services, called brokers, simplify the integration of SSO. In this paper, we shed light on the emerging brokered SSO ecosystem, focusing on the security of the newly introduced actor, the broker. We systematically evaluate the landscape of brokered SSO, uncovering significant blind spots in previous research. Our study reveals that 25% of the websites with SSO integrate brokers for authentication, an area that has not been covered by any previous research. Through our comprehensive security evaluation, we identify three categories of threats associated with brokered SSO: (1) insufficient validation of redirect chains enabling injection attacks, (2) unauthorized data access enabling account takeovers, and (3) violations of security best current practices. We expose vulnerabilities in over 50 brokers, compromising the security of more than 2k websites. These findings represent only a lower bound of a critical situation, underscoring the urgent need for improved security measures and protocols to safeguard the integrity of brokered SSO systems.
- Resource Type:
- Dataset
0Collections1Works -
- Description:
- This dataset consists of 370 RGB images of cracks in concrete structures and the corresponding segmentation masks. The dataset can be used for classification, recognition and semantic segmentation tasks.
- Keyword:
- concrete cracks images annotation
- Subject:
- Concrete damage images and Training data for machine learning
- Date Uploaded:
- 2024-04-17
- Date Modified:
- 2025-02-19
- License:
- Creative Commons CC0 1.0 Universal
- Resource Type:
- Dataset
-
CRC 1280
CRC 1280- Description:
- The CRC 1280 investigates on extinction learning We can easily learn and store new information. However, we are equally able to learn that once acquired information is no longer valid, and cease to respond to it. While the initial acquisition of knowledge is well studied, the process of extinction is far less understood. Extinction involves both forgetting as well as a new learning process that is different and far more complex than the initial learning event. Extinguished responses do not simply disappear but can return under diverse conditions – potentially turning them into invasive components of psychopathological conditions. Despite its relevance, the behavioral, the neural, and the clinical aspects of extinction are by far not understood. Our Collaborative Research Center CRC 1280 aims to study the neural, behavioral, ontogenetic, educational, and clinical mechanisms of extinction in various species, including humans. The diversity of our approaches at the systems and at the methodological level is combined with a high level of homogeneity at structural, experimental, technical, and conceptual levels: At the structural level, all neurobiological and clinical groups concentrate on a network of anatomical structures that are core constituents of extinction learning. At the experimental design level, most studies utilize similar approaches to maximize transfer of data and knowledge between research groups. In addition, wherever possible, experimental projects utilize causal manipulations to achieve mechanistic insights.
1Collections0Works