2015
DOI: 10.3233/jcs-150529
|View full text |Cite
|
Sign up to set email alerts
|

CookiExt: Patching the browser against session hijacking attacks

Abstract: Session cookies constitute one of the main attack targets against client authentication on the Web. To counter these attacks, modern web browsers implement native cookie protection mechanisms based on the HttpOnly and Secure flags. While there is a general understanding about the effectiveness of these defenses, no formal result has so far been proved about the security guarantees they convey. With the present paper we provide the first such result, by presenting a mechanized proof of noninterference assessing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
34
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 32 publications
(36 citation statements)
references
References 25 publications
1
34
0
1
Order By: Relevance
“…Given that defenses against session hijacking also prevent sub-session hijacking, it might seem that sub-session hijacking is an already solved problem. Unfortunately, real-world websites rarely implement full protection against session hijacking [5,6,9,15,16] and commonly build their sessions on top of cookies with different confidentiality or integrity guarantees, which opens the way to sub-session hijacking. Concrete examples of reasons why this might happen in practice are the following:…”
Section: Impact Of Sub-session Hijackingmentioning
confidence: 99%
See 1 more Smart Citation
“…Given that defenses against session hijacking also prevent sub-session hijacking, it might seem that sub-session hijacking is an already solved problem. Unfortunately, real-world websites rarely implement full protection against session hijacking [5,6,9,15,16] and commonly build their sessions on top of cookies with different confidentiality or integrity guarantees, which opens the way to sub-session hijacking. Concrete examples of reasons why this might happen in practice are the following:…”
Section: Impact Of Sub-session Hijackingmentioning
confidence: 99%
“…Necessary (but not sufficient) ingredients include the use of HSTS [3] to enforce ubiquitous encryption and cookie security attributes like HttpOnly and Secure [1] to defend against cookie leakage. Unfortunately, web developers often ignore these recommended security practices, because the adoption of HSTS still lags behind [4,5] and cookie security attributes are often unset [6]. Protection against session hijacking should thus not be taken for granted, especially when the attack surface is amplified by the widespread practice of using multiple cookies for session management [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…In general, there have been only few formal analysis efforts for web applications, standards, and browsers so far. Most of the existing efforts are based on formal representations of (parts of) web browsers or very limited models of web mechanisms and applications [3]- [5], [9]- [11], [14]- [17], [25], [26], [28], [34], [47].…”
Section: Related Workmentioning
confidence: 99%
“…In this case, b must have received an HTTPS response from i (honest identity providers do not send out unencrypted HTTP responses). Honest identity providers send out HTTPS responses in Lines 6,14,17,27,72, and 98 of Algorithm 24 and Line 17 of Algorithm 25. It is easy to see that i does not send out n in Lines 6, 14, 17, and 27 of Algorithm 24 and Line 17 of Algorithm 25 (given that the attacker does not know n), leaving Lines 72, and 98 of Algorithm 24 to analyze.…”
Section: Proof Of Authorizationmentioning
confidence: 99%
“…A few works have developed formal verification techniques to model and analyze web browsers [14,17,16,7,8,30]. Akhawe et al [5] introduce a formal model of web security.…”
Section: Related Workmentioning
confidence: 99%