
Opportunities in Situational Awareness for Cyberse-
curity. Digital Threats, 1(3).
Hardt, D. (2012). The OAuth 2.0 Authorization Framework.
RFC 6749.
Hardt, D., Parecki, A., and Lodderstedt, T. (2024). The
OAuth 2.1 Authorization Framework. Internet-Draft
draft-ietf-oauth-v2-1-10, Internet Engineering Task
Force. Work in Progress.
Headquarters, Department of the Army (2021). Advanced
Situational Awareness. Technical report.
Husák, M., Jirsík, T., and Yang, S. J. (2020). SoK: con-
temporary issues and challenges to enable cyber situa-
tional awareness for network security. In Proceedings
of the 15th International Conference on Availability,
Reliability and Security (ARES).
Husák, M., Khoury, J., Klisura, D., and Bou-Harb, E.
(2023). On the Provision of Network-Wide Cyber
Situational Awareness via Graph-Based Analytics. In
Collet, P., Gardashova, L., El Zant, S., and Abdulka-
rimova, U., editors, Complex Computational Ecosys-
tems, pages 167–179, Cham. Springer Nature Switzer-
land.
Husák, M., Laštovi
ˇ
cka, M., and Tovar
ˇ
nák, D. (2021). Sys-
tem for Continuous Collection of Contextual Informa-
tion for Network Security Management and Incident
Handling. In Proceedings of the 16th International
Conference on Availability, Reliability and Security
(ARES).
Innocenti, T., Golinelli, M., Onarlioglu, K., Mirheidari, A.,
Crispo, B., and Kirda, E. (2023). OAuth 2.0 Redi-
rect URI Validation Falls Short, Literally. In Proceed-
ings of the 39th Annual Computer Security Applica-
tions Conference (ACSAC), page 256–267.
Jannett, L., Mladenov, V., Mainka, C., and Schwenk, J.
(2022). Distinct: Identity theft using in-browser com-
munications in dual-window single sign-on. In Pro-
ceedings of the 2022 ACM SIGSAC Conference on
Computer and Communications Security (CCS), page
1553–1567.
Legg, P. and Blackman, T. (2019). Tools and Techniques
for Improving Cyber Situational Awareness of Tar-
geted Phishing Attacks. In International Conference
on Cyber Situational Awareness, Data Analytics And
Assessment (Cyber SA), pages 1–4.
Li, L., Pal, B., Ali, J., Sullivan, N., Chatterjee, R., and Ris-
tenpart, T. (2019). Protocols for Checking Compro-
mised Credentials. In Proceedings of the 2019 ACM
SIGSAC Conference on Computer and Communica-
tions Security (CCS), page 1387–1403.
Lodderstedt, T., McGloin, M., and Hunt, P. (2013). OAuth
2.0 Threat Model and Security Considerations. RFC
6819.
Nour, B., Pourzandi, M., and Debbabi, M. (2023). A Sur-
vey on Threat Hunting in Enterprise Networks. IEEE
Communications Surveys & Tutorials, 25(4):2299–
2324.
OpenID Foundation (2024). OpenID for Verifiable Creden-
tials - Overview. https://openid.net/sg/openid4vc/.
Peisert, S., Schneier, B., Okhravi, H., Massacci, F., Benzel,
T., Landwehr, C., Mannan, M., Mirkovic, J., Prakash,
A., and Michael, J. B. (2021). Perspectives on the So-
larWinds Incident. IEEE Security & Privacy, 19(2):7–
13.
Pöhn, D. and Hommel, W. (2022). TaxIdMA: Towards
a Taxonomy for Attacks related to Identities. In
Proceedings of the 17th International Conference on
Availability, Reliability and Security (ARES).
Pöhn, D. and Hommel, W. (2023). New Directions and
Challenges within Identity and Access Management.
IEEE Communications Standards Magazine, 7(2):84–
90.
Rodriguez, A. and Okamura, K. (2019). Generating
Real Time Cyber Situational Awareness Information
Through Social Media Data Mining. In 43rd An-
nual Computer Software and Applications Conference
(COMPSAC), volume 2, pages 502–507.
Sterle, L. and Bhunia, S. (2021). On SolarWinds
Orion Platform Security Breach. In SmartWorld,
Ubiquitous Intelligence & Computing, Advanced &
Trusted Computing, Scalable Computing & Commu-
nications, Internet of People and Smart City Inno-
vation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI),
pages 636–641.
Tianfield, H. (2016). Cyber Security Situational Awareness.
In International Conference on Internet of Things
(iThings) and IEEE Green Computing and Commu-
nications (GreenCom) and IEEE Cyber, Physical and
Social Computing (CPSCom) and IEEE Smart Data
(SmartData), pages 782–787.
Walkow, M. and Pöhn, D. (2023). Systematically Searching
for Identity-Related Information in the Internet with
OSINT Tools. In Proceedings of the 9th International
Conference on Information Systems Security and Pri-
vacy (ICISSP), pages 402–409.
Wang, H., Zhang, Y., Li, J., and Gu, D. (2016). The
Achilles heel of OAuth: a multi-platform study of
OAuth-based authentication. In Proceedings of the
32nd Annual Conference on Computer Security Ap-
plications (ACSAC), page 167–176.
Yin, X., Yurcik, W., Treaster, M., Li, Y., and Lakkaraju,
K. (2004). VisFlowConnect: netflow visualizations of
link relationships for security situational awareness.
In Proceedings of the 2004 ACM Workshop on Vi-
sualization and Data Mining for Computer Security
(VizSEC/DMSEC), page 26–34.
Zhang, J., Feng, H., Liu, B., and Zhao, D. (2023). Survey of
Technology in Network Security Situation Awareness.
Sensors, 23(5).
Zurowski, S., Lord, G., and Baggili, I. (2022). A Quanti-
tative Analysis of Offensive Cyber Operation (OCO)
Automation Tools. In Proceedings of the 17th Interna-
tional Conference on Availability, Reliability and Se-
curity (ARES).
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
148