JSON Web Token vulnerabilities and their Mitigation

Graduate Thesis uoadl:3267080 82 Read counter

Unit:
Department of Informatics and Telecommunications
Πληροφορική
Deposit date:
2023-02-16
Year:
2023
Author:
FLOKOS STEFANOS
Supervisors info:
Δρ. Ιωάννης Χαμόδρακας, Εργαστηριακό Διδακτικό Προσωπικό (ΕΔΙΠ), Τμήμα Πληροφορικής και Τηλεπικοινωνιών, Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών
Original Title:
JSON Web Token vulnerabilities and their Mitigation
Languages:
English
Translated title:
JSON Web Token vulnerabilities and their Mitigation
Summary:
In modern web applications and especially in single page applications, the most common way to authenticate a user is the open standard JSON Web Token due to its ease of use in combination with the increased security it offers compared to other authentication practices. However, its use does not immediately make the application invulnerable to safety threats, as there are some subtle points that without proper understanding and an incorrect implementation, can lead to significant security gaps. Even though there are many frameworks and standards providing a very secure authorization and authentication environment (like OAuth, OpenID Connect, SAML), there are cases where developers and businesses would like to opt for a custom, low-level implementation from scratch. This research aims to analyze strong and weak points of JWT and then present comprehensive ways to integrate them into web applications, eliminating occurring vulnerabilities. Finally, a thorough functionality description will be presented in order to illustrate how and why the implementation addresses the aforementioned security gaps.
Main subject category:
Technology - Computer science
Keywords:
Access Token, Refresh Token, JWT Revocation, Service Worker JWT Authentication
Index:
Yes
Number of index pages:
3
Contains images:
Yes
Number of references:
21
Number of pages:
36
JSON_Web_Token_vulnerabilities_and_their_Mitigation.pdf (1 MB) Open in new window