Attacking the OAuth Protocol

Analyzing the weaknesses of the OAuth 2.0 protocol