A Formal Security Analysis of IIFAA DID in Super Apps

Final Community Group Report

This version:
https://www.w3.org/community/reports/cndid/CG-FINAL-iifaa-did-20251107/
Latest published version:
https://w3c-cg.github.io/cndid/IIFAA_technical_report/
Editor:
Ziyu Mao (Zhejiang University, Ant Group)
Lin Huang (Ant Group)
Jingyi Wang (Zhejiang University)
Jingling Xue (UNSW Sydney, Ant Group)

Abstract

Decentralized Identity (DID) enhances authentication and security by shifting control from centralized entities to individuals, ensuring greater privacy and autonomy. This model relies on two principles: (1) users independently manage their cryptographic keys, eliminating third-party reliance, and (2) secure verification occurs through verifiable credentials (VCs) [OID4VC] issued by trusted issuers and verifiable presentations (VPs) [OID4VP] enabling selective disclosure (of claims in VCs). A DID document serves as a unique identifier, functioning without centralized registries and promoting user-centric identity management.

Status of This Document

This specification was published by the Chinese DID & VC Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Final Specification Agreement (FSA) other conditions apply. Learn more about W3C Community and Business Groups.

1. Introduction

Decentralized Identity (DID) enhances authentication and security by shifting control from centralized entities to individuals, ensuring greater privacy and autonomy. This model relies on two principles: (1) users independently manage their cryptographic keys, eliminating third-party reliance, and (2) secure verification occurs through verifiable credentials (VCs) [OID4VC] issued by trusted issuers and verifiable presentations (VPs) [OID4VP] enabling selective disclosure (of claims in VCs). A DID document serves as a unique identifier, functioning without centralized registries and promoting user-centric identity management.

Since 2017, real-world DID adoption has gained traction globally, with pilot application and standardization efforts such as Microsoft's Entra Verified ID [MEVID], BSN DID in China [BSNDID], and the European Digital Identity Regulation [eIDAS]. IIFAA [IIFAADID], a trusted authentication alliance in China, has played a key role in securing DID implementations. Its technical standard, compatible with Trusted Execution Environments (TEE) and Secure Elements (SE), has been adopted across 1.6 billion devices, 43 phone brands, and 900 models worldwide [IIFAAWebsite].

Mobile-based services, especially within super apps like Alipay and WeChat, are rapidly growing. By hosting diverse services via mini-programs, these apps enable seamless interactions and robust private identity management, making them well-suited for DID integration.

Security Concerns. As DID adoption grows, security concerns—such as protecting users' personal data [VC-Data-Integrity-1.0]—are increasingly relevant, especially as standards continue to evolve. Protocols like DIDComm v2.0 [DIDComm] enhance encryption and messaging, while OIDC4VC [OID4VC] expands support for credential issuance and selective disclosure. However, fragmented DID standards [Braun2024] pose security challenges. To address these, the W3C Threat Modeling Community Group (TMCG) launched in July 2024 to develop threat models. Their initial GitHub draft [W3C-threat-modeling] applies Adam Shostack's four-question framework [Shostack-4-question] for high-level security analysis. While insightful, these efforts provide only a broad overview, lacking the depth for systematic vulnerability assessment.

Motivation for Formal Analysis. Industry security audits rely on established methodologies and expert reviews. To improve rigour and consistency, we conduct the first in-depth formal analysis of a real-world IIFAA application, focusing on its mobile-based integration within Alipay. Using symbolic analysis, we clarify informal DID specifications, identify implicit security assumptions, and verify claimed security properties, despite the IIFAA standard's informal, native-language format, similar to other standards [MEVID, BSNDID, eIDAS]. Moreover, as noted in [W3C-threat-modeling], the threat model is a living document, requiring security analysis tailored to specific contexts. Therefore, we develop a super-app-specific threat model to ensure a more precise and relevant assessment. This analysis contributes to standard refinement and enhances security in real-world deployments.

Related Work. Recent studies have applied formal methods to analyze the security of DID-related protocols. Hauck [verifyOID4VC] examined OpenID for VC Issuance [OID4VC] and VPs [OID4VP] using the Web Infrastructure Model (WIM). However, this pen-and-paper analysis relies on expertise, lacks automation, and covers limited aspects of communication protocols in DID applications. Badertscher et al. [Badertscher2024] conducted the first formal analysis of DIDComm's cryptographic foundations, confirming its anonymity and authenticity while proposing protocol improvements. Braun et al. [verifySSI] analyzed a self-constructed protocol based on SSI specifications. While comprehensive in modeling a DID application's workflow, it remains abstract, relying on a limited Dolev-Yao threat model [DolevYao] and overlooking the varied ways VPs can be derived from VCs, potentially missing real-world attack vectors.

Challenges. This work bridges the gap between formal analysis and practical implementations by systematically analyzing IIFAA DID [IIFAADID] within Alipay using Tamarin [Tamarin] while preserving fine-grained details in our model. Two key challenges arise: (1) Like other DID standards [MEVID, BSNDID, eIDAS], IIFAA DID lacks a detailed specification, providing only a high-level workflow [IIFAADID], which complicates comprehensive modeling, and (2) The complexity of super apps like Alipay poses significant challenges to both formal modeling and verification in Tamarin.

Our Approach. To address these challenges, we first align the IIFAA standard [IIFAADID] with its implementation in Alipay, adding necessary details for a comprehensive formal model. Next, we define security goals using first-order logic (FOL). This is the in-depth analysis of the IIFAA DID standard under a threat model tailored to super apps.

Contributions. Super apps, likened to operating systems, integrate multiple services seamlessly. DID enables a unified, secure identity across these services. Within super apps, access control and cryptographic protocols interact with the DID infrastructure on behalf of mini-programs, introducing new security implications and the need for a dedicated threat model. This report presents the first symbolic model capturing super app and mini-program features under a realistic threat model, enabling a systematic analysis of DID security risks.

In this analysis work, we make the following contributions:

  1. Formal Model of DID. We develop a symbolic model of IIFAA DID [IIFAADID] in Alipay, capturing key super app features under a tailored threat model.
  2. Formalized Security Goals. We define five key security goals by extracting specifications from the IIFAA standard and W3C documents.
  3. Security Risks, Recommendations, and Insights. Using Tamarin, we validate security claims and identify three potential risks. Our findings provide recommendations and insights into strengthening DID security in real-world deployments.

2. Background

We provide an overview of DID systems, then discuss super apps and their integration with DID technologies.

2.1 Decentralized Identities

A DID Document is a key component of decentralized identity, containing claims (attributes), cryptographic keys, authentication protocols, and service endpoints. These elements enable identity verification and secure communication.

A DID system facilitates credential issuance, authentication, and verification among three roles: holder, issuer, and verifier. Note that verifier corresponds to the Service Provider (SP) in the original IIFAA Decentralized Authentication Technical Specification [IIFAADID]. The issuer issues a verifiable credential (VC) to the holder, who later generates a verifiable presentation (VP) for the verifier. A key feature, selective disclosure, allows the holder to share only necessary claims while protecting other personal information.

A VC is a cryptographically secured digital certificate linking a holder to verified attributes. It contains three components: (1) Meta (metadata like validity dates), (2) Claims (verifiable information), and (3) proofVC (a cryptographic proof ensuring integrity and issuer authenticity).

A VP is a cryptographically signed document compiled by the holder, containing one or more VCs. It proves credential possession while enabling selective disclosure. Like a VC, it includes proofVP to ensure integrity and authenticity, allowing verifiers to trust the claims without contacting the issuer.

2.2 Super Apps

A super app like Alipay hosts multiple mini-programs, offering diverse services through a unified interface. It consists of a frontend client on the phone and a backend server operated by the super app developer, while each mini-program has its own frontend client and remote backend server. In a DID protocol within a super app, the holder, issuer, and verifier roles map to the super app client (securely managing private keys and credentials in trusted environments like TEE), the mini-program client, and the mini-program server, respectively.

Consider a mini-program on Alipay. The four entities interact as follows:

  1. Alipay Client manages mini-program lifecycle, integrity, authentication, and permissions, providing APIs for interaction with Alipay's lower-layer services.
  2. Alipay Server handles user management, API interactions, and service implementation for the Alipay client.
  3. Mini-Program Client, developed using web technologies, interacts with the Alipay client via JSAPI [AlipayJSAPI] and communicates with its server over TLS.
  4. Mini-Program Server, maintained by its developer, processes business logic and data while adhering to Alipay's security standards. It communicates with the Alipay server via OpenAPI [OpenAPI], enforcing mutual message signing for authentication and data integrity.

Mini-program integrity is ensured through signature verification. Upon release, the platform signs the mini-program code and configuration file (generated by the Alipay Server). The Alipay client verifies this signature before execution.

JSAPI access control rules are defined in the mini-program's configuration file. DID-related JSAPIs or plugins require explicit permission, granted only to enterprise mini-programs after a business contract. As a result, multiple mini-programs can access DID services on a holder's device, but the JSAPI link lacks additional encryption and integration protection.

3. Threat Model

Our threat model, tailored for super apps, extends the Dolev-Yao model, where an adversary can intercept, modify, and inject messages over public channels. Additionally, we consider:

  1. Hooks in Mobile Apps. Clients are inherently insecure and may be compromised, exposing JSAPI calls between mini-programs and the super app.
  2. Private Key Leakage. Many mini-programs hardcode their private keys (or master keys in WeChat [Zhang2023]) in their frontends, risking exposure. Similarly, DID secret keys may also be leaked.

Assumptions.
IIFAA DID [IIFAADID] is a high-level protocol relying on TLS and OAuth [OAuth2.0]. Following [SOAP], we assume such protocols are secure, and adversaries are constrained by cryptographic primitives. In addition, TLS sessions and the super app server remain uncompromised.

4. Formal Model of DID

4.1 Protocol Extraction

IIFAA DID: VC issuance and VP verification phases. MP Client and MP Server stand for Mini-Program Client and Mini-Program Server, respectively.
Figure 1 Figure 1: IIFAA DID: VC issuance and VP verification phases. MP Client and MP Server stand for Mini-Program Client and Mini-Program Server, respectively.

Like other DID standards [MEVID, BSNDID, eIDAS], IIFAA [IIFAADID] is informal and written in a native language. Figure 1 outlines its implementation in Alipay for a specific mini-program on the platform. We distilled the protocol into two sub-protocols—VC Issuance and VP Verification—by manually reviewing the IIFAA standard [IIFAADID] and Alipay implementation documents. The procedures "VC Construction” and "VP Construction” will be referenced in Section 4.2.

As described in Section 2.2, the Alipay client acts as the holder, managing private keys and credentials in a trusted environment (TEE) via services provided by the Alipay server. The mini-program's client (frontend) and server (backend server) function as the issuer for VC issuance and the verifier for VP verification. Message exchanges primarily rely on JSAPI calls and TLS.

4.2 Abstraction and Modeling

Our formal model covers the following aspects of IIFAA: (1) initialization, (2) VC Issuance, (3) VP Verification, (4) SD-JWT Data Format, (5) TLS and JSAPI Calls, and (6) Adversary Capabilities.

Initialization. The protocol starts by initializing a mini-program within a user's Alipay app using the multiset rewriting rule (MSR):

MiniProgram-Register

rule MiniprogramRegister:
  [ Fr(~appid), Fr(~openid), Fr(~k),
    !SuperApp(name, phoneNumber, userid) ]
  --[ MiniprogramReg($A, userid, ~appid)]->
  [ !MiniProgram($A, ~openid, ~appid), 
    !MLTK($A, ~k), !MPK($A, pk(~k)) ] 
  

A variable is fresh if prefixed by ~ and public if prefixed by $. To enhance privacy, the Alipay client anonymizes userid across mini-programs, replacing it with openid [Alipay-Docs] to prevent tracking. Each registered mini-program has a unique appid. Upon registration, a persistent key pair (!MLTK, !MPK) is generated, with !MPK stored in the DID document for signature verification. The identifier $A denotes the mini-program's role, either $issuer or $verifier.

VC Issuance. As shown in Figure 1, the Alipay user requests a VC via the mini-program frontend and receives it upon issuance. The process involves: (i) verifying the holder's claims and (ii) constructing the VC.

User information (e.g., name and age) is stored on the Alipay server and accessed via OAuth 2.0 [OAuth2.0], specifically the authorization code flow. Upon user consent, Alipay generates an authorization code (AuthCode) for the mini-program, which exchanges it for a short-lived access token to retrieve user data. We abstract this process, modeling only the TLS exchange between the mini-program's server and Alipay servers.

According to the basic user information, the issuer generates the claims about this user (e.g., student of Zhejiang Univ.), then constructs a VC based on the W3C standard [VC-Data-Integrity-1.0]. We model SD-JWT [sdjwt], which enables selective disclosure in a JSON-encoded structure within a JWS payload, aligning with [IIFAADID].

As shown in Figure 1, the "VC Construction" process works as follows: C={c1,,cn} denotes all claims available, digest represents the concatenation of their hashes, and sigJWT is the concatenation of digest and its issuer-signed value using the private key skI. For secure transmission to the Alipay client, the VC is encrypted with an envelope key in practice. In contrast, the IIFAA technical specification specifies encryption using the holder's DID public key.

VP Verification. As shown in Figure 1, a VP verification request originates from the mini-program frontend. The Alipay client, as the holder, constructs the VP using a single VC stored in TEE on the device (see Section 3).

During "VP Construction", the holder selects claims D={ci1,,cik} from C={c1,,cn}, excluding private claims CP, to form VC. The holder signs VC with their private key skH, generating sigH as proof of origin. The verifier checks sigH with the holder's public key pkH, verifies sigJWT using the issuer's public key pkI for authenticity, and confirms D matches its hash in digest.

We model a term structure in Tamarin using the tuple operator and multiset union +. The associative and commutative properties of + enable selective disclosure modeling via the subterm relation [subterm].

SD-JWT Data Format. SD-JWT [sdjwt] is a composite JSON-encoded JWS structure enabling selective disclosure. By separating claims during VC issuance (as shown in the "VC Construction" process in Figure 1), its signature proof remains valid even when some claims are selectively removed.

TLS and JSAPI Calls. TLS secures communication between mini-program servers and the Alipay server (10 rules), while JSAPI calls enable interactions between mini-program clients and the Alipay client (4 rules).

Adversary Capabilities. We define 10 rules to model adversary capabilities for handling mobile app hooks and private key leakage (see Section 3).

5. Security Goals

Security requirements in DID systems have been informally discussed across various ecosystems [MEVID, BSNDID, eIDAS, IIFAADID]. TMCG [W3C-threat-modeling] identifies risks through high-level evil stories, such as a verifier over-collecting data from holders or an issuer tracking holders. In a recent work, Braun et al. [Braun2024] formalize authentication lemmas for requirements like the holder presented a credential to the intended verifier but lack clear mappings to security properties like secrecy or integrity.

To address this, we refine incomplete specifications and vague formalizations with clear definitions and FOL formulas in Tamarin [Tamarin] for five security goals, supporting the formal analysis of IIFAA [IIFAADID] in Alipay.

Executability. We validate our model (see Section 5) by defining a lemma that ensures legal executions without an adversary, preventing modeling errors.

Goal 1. Secrecy. Undisclosed data and issued credentials must remain private. See: Section 5.2a “Encryption Communication” in [IIFAADID] We define secrecy as ensuring that private claims are not revealed, even to honest verifiers or third parties. Our formalization guarantees that undisclosed data and credentials are inaccessible to the Dolev-Yao adversary [DolevYao]. We use the following FOL to formalize the secrecy of a VC:

 uid, VC, t1. StoreVC(uid, VC)αt1¬( t2, uid. K(VC)αt2)

The formula states that once there exists a record of a user uid storing a verifiable credential VC at time t1 (i.e., StoreVC(uid, VC)αt1), then it must never be the case that there exists a time point t2 at which the adversary knows the content of VC (i.e., uid.K(VC)αt2).

Goal 2. Integrity. A credential must originate from the intended issuer and remain unmodified. See: Section 5.2.e “Data integrity” in [IIFAADID] This ensures that an issued credential cannot be forged or altered. Formally, we model integrity as non-injective authentication.

 VP, v, id, t1. StoreVC(uid,VC)αt1( t2, aid. IssueVC(aid,VC)αt2t2<t1)

Goal 3. Injective Agreement. Each verifier-approved VP should correspond to a unique VP request. See: Section 5.2.d “Anti-replay” in [IIFAADID] This prevents replay attacks and ensures that only a legitimate holder can generate a valid VP.

 VP, v, id, t1. PassVerify(aid,VP)αt1( t2, uid. HolderPresent(uid,VP)αt2t2<t1 ¬( t3, aid. PassVerify(aid,VP)αt3t1t3) ¬(aid=aid))

Goal 4. Legal Presentation. The “wallet” presenting a VC must be the one to which it was issued. See: Section 5.2.b “Two-way authentication” in [IIFAADID] This requirement strengthens authentication by ensuring a one-to-one mapping between a VC and its designated holder, preventing unauthorized use of issued credentials.

 user, t1. GetRights(user)αt1( t2, uid. CredentialPresent(user,VP)αt2t2<t1)

Goal 5. Selective Disclosure. A verifier can access only a subset of the claims in a VC. See: Section 6.3 “Disclosure of Personal Information” in [IIFAADID] This enforces data minimization, ensuring that only necessary claims are disclosed while preserving the holder's privacy.

We use the following FOL formula to express this goal:

 VP, v, id, t1. VPGetPass(v,id,VC,VP)αt1( t2, uid, VC. importVC(uid,VC)αt2t2<t1  sigJWT, d, C. VC=sigJWT,CVC=sigJWT,DDC)

Here, VC and C come from the "VC Construction” in Figure 1(a), while VP and D originate from the "VP Construction” in Figure 1(b). The mini-program verifier v with identity id first validates VP at timestamp t1 (line 1) and then verifies that a holder (uid) possesses a VC from an earlier timestamp t2 (line 2), from which VP is constructed (line 3). Note that the symbol denotes the subterm relation [subterm], representing the subset relationship between VP and VC.

6. Recommendations, Lessons and Insights

We summarize our proof effort, and provide recommendations to enhance DID security analysis.

6.1 Proof Effort

Tamarin requires manual intervention for protocols with large state spaces. We use interactive mode to refine proof strategies, record solving steps, and apply regex-based heuristics for automation. Auxiliary lemmas further aid verification.

This work complements manual auditing by verifying IIFAA [IIFAADID] in Alipay, identifying security assumptions, and proposing mitigations for potential attacks.

Following [Morio2023, Girol2020], we formalize each security goal as τCP1Pn, where τ is the trigger event [Girol2020], C is the intended security property, and Pi represents the i-th attack vector violating C.

This rule states: if τ holds, then either C is satisfied, or an attack vector Pi exists. To identify all the attack vectors, we start with τC. When Tamarin finds the first attack trace P1, it is added to the formula. This process repeats iteratively until τCP1Pn holds, ensuring no further attack vectors exist.

Table 1: Proof results.
Goal Property Verified Conditions
1 Secrecy Adversary cannot control multiple verifiers.
2 Integrity
3 Injective Agreement Challenge Code should be enabled.
4 Legal Presentation VP should avoid leakage.
5 Selective Disclosure

6.2 Security Recommendations

As shown in Table 1, our analysis validates three security goals (Executability, Integrity, and Selective Disclosure) and finds that the satisfaction of the other three goals (Secrecy, Injective Agreement, and Legal Presentation) requires additional conditions. We reported these to developers, who confirmed that mitigation solutions were deployed.

1. Multiple VPs may recover VC

The falsification of Goal 1 (Secrecy) reveals that an adversary controlling multiple mini-program verifiers can reconstruct a VC from its VPs by observing inputs, outputs, and using compromised private keys for decryption.

The attack proceeds as follows:

  1. Malicious verifiers V send VP requests to the same holder.
  2. Each verifier viV receives VPi, decrypts it using skvi, and collects the disclosed claims.
  3. Since different VPs may reveal different parts of a VC, the adversary aggregates claims ci from multiple VPi to reconstruct the original VC as:
    VCsigJWT  c1    cn

In practice, enterprise mini-program verifiers undergo strict registration and audits, making it difficult—but not impossible—for an attacker to control multiple malicious mini-programs to execute this attack.

This attack underscores the need for stricter security in enterprise verifiers, including rigorous registration, auditing, and compliance checks. VP verification should also require user confirmation, particularly for sensitive data, ensuring undisclosed claims remain protected. Additionally, zero-knowledge proof technology can be employed to protect users' sensitive information, preventing verifiers from obtaining accurate personal privacy data.

2. Lack of Challenge Code Enables VP Replay

The falsification of Goal 3 (Injective Agreement) confirms a replay attack in VP verification, as noted in [Braun2024]. Like W3C standards [VC-Data-Integrity-1.0], IIFAA DID [IIFAADID] treats challenge codes as optional. While we recommend using a challenge-response mechanism to prevent replay attacks, developers argue that some applications omit it for efficiency, especially when replay attacks have inconsequential consequences.

Based on our analysis, we recommend a thorough risk assessment to balance efficiency and security, ensuring that omitting challenge codes is justified and aligns with the application's security needs.

3. Decoupling VP from Presenter Identity

Verifying Goal 4 (Legal Presentation) reveals that VPs are not directly bound to the presenter. A VP remains valid even if forwarded to another holder, creating a privacy risk where verification does not confirm the original presenter's identity.

On mobile platforms (e.g., the Alipay client), we recommend implementing VP verification as an "atomic operation" (e.g., one-click actions like "click-to-jump") to minimize the window for interception and misuse. Optionally, biometric authentication (e.g., facial or fingerprint recognition [fingerprint]) can be integrated based on risk levels, further binding a VP to its legitimate user.

6.3 Lessons and Insights

A bottom-up modeling approach enhances the efficiency and scalability of DID protocol analysis, facilitating its integration into practical auditing workflows—our most valuable takeaway.

Formal analysis of protocols is highly time-consuming. Extracting the complete protocol (see Section 2.3), modeling in Tamarin (see Section 3.1), and developing proof strategies took approximately three person-months. The final model comprises 33 rules, totalling 1000 lines of code (LoC).

In practice, the lifecycle of protocols like DID—from design to deployment—evolves rapidly, demanding a verification approach distinct from most academic security studies [SPDM, EME, 5GAKA, TLS1.3]. Existing research emphasizes low-level details (e.g., handshake mechanisms), resulting in complex models with limited scalability. The high effort required to build formal models from scratch further hinders the adoption of automated formal methods in industry.

Enhancing the efficiency of formal analysis is crucial for real-world adoption. As DID depends on infrastructure like TLS, a bottom-up approach proved effective in formalizing complex models like IIFAA DID [IIFAADID]. By initially modeling foundational components such as TLS and JSAPI, integrating these into an updated or entirely new DID protocol model becomes more streamlined. This reuse of models boosts scalability and reduces modeling and proof efforts, vital as [IIFAADID] and similar standards [MEVID, BSNDID, eIDAS] evolve.

7. Conclusion

We conducted the first formal analysis of a DID application within a super app. Our symbolic model captures the fine-grained mechanisms of DID authentication and its underlying infrastructure. Key security properties—secrecy, integrity, injective agreement, legal presentation, and selective disclosure— are formalized using FOL formulas despite incomplete and imprecise specifications. Through automated auditing based on formal verification, we have either confirmed the validity of security properties or precisely identified the conditions required for their satisfaction, while providing corresponding security recommendations.

References

[VCDM]
Verifiable Credentials Data Model v2.0. W3C. W3C Candidate Recommendation Draft 28 August 2024. URL: https://www.w3.org/TR/vc-data-model-2.0/
[DID]
Decentralized Identifiers (DIDs) v1.0. W3C. W3C Recommendation 19 July 2022. URL: https://www.w3.org/TR/did-core/
[DIDComm]
DIDComm Messaging v2.x Editor's Draft. Decentralized Identity Foundation. DIDComm Messaging v2.x Editor's Draft. URL: https://identity.foundation/didcomm-messaging/spec/
[W3C-threat-modeling]
Decentralized Identities Threat Model. Threat Modeling Community Group (TMCG). Accessed: 2024-09-14. URL: https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md
[SOAP]
SOAP: A Social Authentication Protocol. Felix Linker; David Basin. 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association. 2024. Pages: 3223–3240. URL: https://www.usenix.org/conference/usenixsecurity24/presentation/linker
[Alipay-Docs]
Alipay Mini Program Documentation. Alipay. 2024. URL: https://miniprogram.alipay.com/docs/
[SDJWT]
Selective Disclosure for JWTs (SD-JWT). Daniel Fett; Kristina Yasuda; Brian Campbell. Internet Engineering Task Force. Internet-Draft, Work in Progress. 2024-10-18. URL: https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/13/
[EME]
Formal Security Analysis of Widevine through the W3C EME Standard. Stéphanie Delaune; Joseph Lallemand; Gwendal Patat; Florian Roudot; Mohamed Sabt. 33rd USENIX Security Symposium (USENIX Security 24). 2024. Pages: 6399–6415.
[SPDM]
Formal Analysis of SPDM: Security Protocol and Data Model version 1.2. Cas Cremers; Alexander Dax; Aurora Naska. 32nd USENIX Security Symposium (USENIX Security 23). 2023. Pages: 6611–6628.
[OAuth2.0]
The OAuth 2.0 Authorization Framework. Dick Hardt. RFC 6749. RFC Editor. 2012. URL: https://www.rfc-editor.org/info/rfc6749
[Shostack-4-question]
4 Question Frame. Adam Shostack. Accessed: 2024-09-14. URL: https://github.com/adamshostack/4QuestionFrame
[Tamarin]
The TAMARIN prover for the symbolic analysis of security protocols. Simon Meier; Benedikt Schmidt; Cas Cremers; David Basin. Computer Aided Verification: 25th International Conference, CAV 2013. Springer. 2013. Pages: 696–701.
[subterm]
Subterm-based proof techniques for improving the automation and scope of security protocol analysis. Cas Cremers; Charlie Jacomme; Philip Lukert. 2023 IEEE 36th Computer Security Foundations Symposium (CSF). IEEE. 2023. Pages: 200–213.
[ProVerif]
Automatic verification of security protocols in the symbolic model: The verifier ProVerif. Bruno Blanchet. International School on Foundations of Security Analysis and Design. Springer. 2012. Pages: 54–87.
[TLS1.3]
A comprehensive symbolic analysis of TLS 1.3. Cas Cremers; Marko Horvat; Jonathan Hoyland; Sam Scott; Thyla van der Merwe. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017. Pages: 1773–1788.
[5GAKA]
A formal analysis of 5G authentication. David Basin; Jannik Dreier; Lucca Hirschi; Saša Radomirović; Ralf Sasse; Vincent Stettler. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018. Pages: 1383–1396.
[EMV]
The EMV standard: Break, fix, verify. David Basin; Ralf Sasse; Jorge Toro-Pozo. 2021 IEEE Symposium on Security and Privacy (SP). IEEE. 2021. Pages: 1766–1781.
[DeepSec]
DEEPSEC: deciding equivalence properties in security protocols theory and practice. Vincent Cheval; Steve Kremer; Itsaka Rakotonirina. 2018 IEEE Symposium on Security and Privacy (SP). IEEE. 2018. Pages: 529–546.
[WeChat]
WeChat Official Website. WeChat. 2024. URL: https://www.wechat.com/
[Alipay]
Alipay. AliPay. 2024. URL: https://global.alipay.com/platform/site/ihome
[3GPP]
Security architecture and procedures for 5G system. 3GPP. Technical Specification (TS) 3GPP TS 33.501 v15.1.0. 2018.
[Braun2024]
SSI, from Specifications to Protocol? Formally verify security!. Christoph H-J Braun; Ross Horne; Tobias Käfer; Sjouke Mauw. Proceedings of the ACM on Web Conference 2024. 2024. Pages: 1620–1631.
[Badertscher2024]
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging. Christian Badertscher; Fabio Banfi; Jesus Diaz. Cryptology ePrint Archive. 2024.
[VerifyOID4VC]
OpenID for Verifiable Credentials: Formal Security Analysis Using the Web Infrastructure Model. Fabian Hauck. Master's thesis. University of Stuttgart. 2023. URL: http://elib.uni-stuttgart.de/handle/11682/13791. DOI: 10.18419/opus-13772.
[OID4VC]
OpenID for verifiable credentials. Kenichi Nakamura Chadwick; Jo Vercammen. 2022.
[OID4VP]
OpenID for Verifiable Presentations. O. Terbu; T. Lodderstedt; K. Yasuda; T. Looker. 2023-03-25. URL: https://openid.net/specs/openid-4-verifiable-presentations-1_0-17.html
[DolevYao]
On the security of public key protocols. Danny Dolev; Andrew Yao. IEEE Transactions on Information Theory. IEEE. 1983. Volume 29, Number 2. Pages: 198–208.
[Zhang2023]
Don't leak your keys: Understanding, measuring, and exploiting the appsecret leaks in mini-programs. Yue Zhang; Yuqing Yang; Zhiqiang Lin. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 2023. Pages: 2411–2425.
[MEVID]
Microsoft Entra Verified ID. Microsoft. URL: https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-verified-id
[BSNDID]
BSN DID. BSN. URL: https://www.bsnbase.com/
[IIFAAWebsite]
The IIFAA Official Web Page. IIFAA. URL: https://www.iifaa.org.cn/
[IIFAADID]
IIFAA Decentralized Authentication Technical Specification, Part 1: General Requirement. IIFAA. URL: https://www.iifaa.org.cn/technical#standard
[EIDAS]
The European Digital Identity Regulation. URL: https://www.european-digital-identity-regulation.com/
[VC-Data-Integrity-1.0]
Verifiable Credential Data Integrity 1.0. Dave Longley, Manu Sporny. 2023. URL: https://www.w3.org/TR/vc-data-integrity/
[FINGERPRINT]
Security protocols for biometrics-based cardholder authentication in smartcards. Luciano Rila; Chris J. Mitchell. Applied Cryptography and Network Security: First International Conference, ACNS 2003, Kunming, China, October 16–19, 2003. Springer. 2003. Pages: 254–264.
[Morio2023]
Automated security analysis of exposure notification systems. Kevin Morio; Ilkan Esiyok; Dennis Jackson; Robert Künnemann. 32nd USENIX Security Symposium (USENIX Security 23). 2023. Pages: 6593–6610.
[Girol2020]
A spectral analysis of noise: A comprehensive, automated, formal analysis of Diffie-Hellman protocols. Guillaume Girol; Lucca Hirschi; Ralf Sasse; Dennis Jackson; Cas Cremers; David Basin. 29th USENIX Security Symposium (USENIX Security 20). 2020. Pages: 1857–1874.
[OpenAPI]
OpenAPI Signature Methods. Alipay. URL: https://opendocs.alipay.com/common/02kf5p
[AlipayJSAPI]
Alipay Mini-program API list. Alipay. 2024. Accessed: 2024-11-17. URL: https://opendocs.alipay.com/mini/api/vzt2xm