BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//talks.secworkshop.events//osw2026//talk//K7TUPH
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-osw2026-K7TUPH@talks.secworkshop.events
DTSTART;TZID=CET:20260529T110000
DTEND;TZID=CET:20260529T113000
DESCRIPTION:Session fixation attacks affect certain OAuth-related standards
  but remain unexamined in *mainstream* OAuth 2.0 deployments. We identify 
 40+ vulnerable vendors in "connector ecosystems" for app integration and a
 gentic AI\, and propose mitigations.
DTSTAMP:20260517T050240Z
LOCATION:Work Lab II
SUMMARY:Understanding OAuth Session Fixation in Connector Ecosystems - Kaix
 uan Luo
URL:https://talks.secworkshop.events/osw2026/talk/K7TUPH/
END:VEVENT
END:VCALENDAR
