{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:36:20Z","timestamp":1725687380667},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346717","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:17:05Z","timestamp":1449595025000},"page":"416-421","source":"Crossref","is-referenced-by-count":2,"title":["All your Google and Facebook logins are belong to us: A case for single sign-off"],"prefix":"10.1109","author":[{"given":"Vaibhav","family":"Rastogi","sequence":"first","affiliation":[]},{"given":"Ankit","family":"Agrawal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-1155-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.30"},{"key":"ref10","article-title":"Integuard: Toward automatic protection of third-party web service integrations","author":"xing","year":"2013","journal-title":"NDSS"},{"key":"ref6","first-page":"399","article-title":"Explicating sdks: Uncovering assumptions underlying secure authentication and authorization","author":"wang","year":"2013","journal-title":"Usenix Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_14"},{"key":"ref5","article-title":"Authscan: Automatic extraction of web authentication protocols from implementations","author":"bai","year":"2013","journal-title":"NDSS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078833"},{"key":"ref7","article-title":"Ssoscan: automated testing of web applications for single sign-on vulnerabilities","author":"zhou","year":"2014","journal-title":"Proceedings of the 23rd USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382238"},{"key":"ref9","first-page":"653","article-title":"Language-based defenses against untrusted browser origins","author":"bhargavan","year":"2013","journal-title":"Usenix Security Cite-seer"},{"year":"0","key":"ref1","article-title":"Alexa top 500 global sites"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida, India","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346717.pdf?arnumber=7346717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:18:17Z","timestamp":1490390297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346717","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}