• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (11): 2121-2127.

• 论文 • Previous Articles     Next Articles

Analyzing and verifying an open authorization
protocol OAuth 2.0 with SPIN 

CHENG Daolei,XIAO Meihua,LIU Xinqian,MEI Yingtian,LI Wei   

  1. (School of Software,East China Jiaotong University,Nanchang 330013,China)
  • Received:2015-08-10 Revised:2015-10-10 Online:2015-11-25 Published:2015-11-25

Abstract:

The OAuth 2.0 is an open authorization protocol which solves the problem of user accounts associating and resources sharing. However, due to its weak security, massive user information of network companies is leaking. Besides, the https channel used by OAuth 2.0 to transmit data is inefficient, making the OAuth 2.0 an attack object   of hackers. We propose an open authorization protocol, which transmits the data of the OAuth 2.0 protocol in http channels, model the protocol based on the Promale language and DolevYao attacker model, and employ the SPIN for model checking. The results of formal analysis show that the OAuth2.0 protocol encrypted by the public key encryption system is unsafe. The proposed modeling method has great significance in formal analysis of similar license agreement.

Key words: OAuth 2.0 protocol;information leakage;public key encryption system;model checking