2019
DOI: 10.48550/arxiv.1908.02204
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…This definition is in line with that of prior work (XS-Leaks Wiki[46] and COSI attacks[49]), but makes it explicitly clear that the attacker aims to infer the state that the user has with the targeted website.…”
mentioning
confidence: 67%
See 2 more Smart Citations
“…This definition is in line with that of prior work (XS-Leaks Wiki[46] and COSI attacks[49]), but makes it explicitly clear that the attacker aims to infer the state that the user has with the targeted website.…”
mentioning
confidence: 67%
“…in 2000, Felten and Schneider described how the time to request a resource leaked information about its cache status. Prior work on categorizing XS-Leaks has mainly focused on enumerating the different known techniques and grouping them by the technique that is used [46], or based on the differences in the resource that can be detected [18,49]. In this section we introduce a new classification method that is based on our model and aims to capture the intrinsic properties of XS-Leaks; namely the component to which the web application state is transferred, the inclusion method that is used for this state-transfer, and the technique that is used to finally extract this state.…”
Section: Xs-leak Attacks: Current Statementioning
confidence: 99%
See 1 more Smart Citation
“…Since resources in the HTTP cache can be hit across domains, this implies that a range request initiated on one domain can be resumed on another, thus leaking information on what other sites have been previously visited. This attack, known as a cross site leak or XS-Leak [52], is not specific to range requests. Many browsers have begun discussing the implementation of (or have already implemented in the case of Safari [26,30]) dual-key caching.…”
Section: Discussionmentioning
confidence: 99%