, AT&T Sued Over $24 Million Cryptocurrency SIM Hijack Attacks, API Assistant: automated security assessment of 3rd party apps for the API economy

. Dpcm, , 2014.

. Facebook, Getting started with the Facebook SDK for Android, 2017.

, NIST Special Publication 800-63b

, NIST Special Publication 800-63b. Section 8.1: Authenticator Threats

, Security Assertion Markup language (SAML)

, Surprising New Password Guidelines from NIST

, Here's what you need to know

, CAD: Codice dell, 2005.

E. Chen, Y. Pei, S. Chen, Y. Tian, R. Kotcher et al., OAuth Demystified for Mobile Application Developers, Proceedings of the ACM Conference on Computer and Communications Security (CCS, 2014.

L. Cranor, Your mobile phone account could be hijacked by an identity thief

E. Parliament,

, Garante Privacy: Personal Data Protection Code. Legislative Decree no. 196 of 30, 2003.

, General Data Protection Regulation: Regulation EU, 2016.

, OAuth Working Group: OAuth 2.0 for Native Apps, 2016.

T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin, Attacks on WebView in the Android system, Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, pp.343-352, 2011.

, OpenID Foundation: OpenID Connect Core, 2014.

G. Sciarretta, R. Carbone, S. Ranise, and L. Viganò, Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience, Proceedings of the 7th International Conference on Principles of Security and Trust (POST), pp.188-213, 2018.

M. Shehab and F. Mohsen, Towards Enhancing the Security of OAuth Implementations in Smart Phones, IEEE International Conference on Mobile Services (MS), pp.39-46, 2014.