Proceedings of the 2011 ACM Symposium on Applied Computing 2011
DOI: 10.1145/1982185.1982511
|View full text |Cite
|
Sign up to set email alerts
|

Reliable protection against session fixation attacks

Abstract: The term 'Session Fixation vulnerability' subsumes issues in Web applications that under certain circumstances enable the adversary to perform a Session Hijacking attack through controlling the victim's session identifier value. A successful attack allows the attacker to fully impersonate the victim towards the vulnerable Web application. We analyse the vulnerability pattern and identify its root cause in the separation of concerns between the application logic, which is responsible for the authentication proc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 8 publications
0
19
0
Order By: Relevance
“…• The authenticated cookie is secured against JavaScript read access by the HTTPonly cookie attribute [28]. • The value of the authenticated cookie is changed every time the authorization level of the user changes to combat potential session fixation vulnerabilities [21]. • State-changing interfaces are secured against CSRF using server-side checking of security nonces [33] or strict enforcement of matching origin HTTP response header [3].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…• The authenticated cookie is secured against JavaScript read access by the HTTPonly cookie attribute [28]. • The value of the authenticated cookie is changed every time the authorization level of the user changes to combat potential session fixation vulnerabilities [21]. • State-changing interfaces are secured against CSRF using server-side checking of security nonces [33] or strict enforcement of matching origin HTTP response header [3].…”
Section: Discussionmentioning
confidence: 99%
“…While this problem is partially addressed with currently experimental browser features [6,2], the only reliable way for an application to mitigate this attack, is to renew the cookie's value each time the authorization level of the user changes [21].…”
Section: Issues Related To Cookie-based Authentication Trackingmentioning
confidence: 99%
“…Furthermore, Johns et al [8] have proposed two more server-side solutions for combating session fixation attacks against cookie-based session management. One consists of instrumenting the underlying web framework, to automatically regenerate the SID when an authentication process is detected.…”
Section: Current Countermeasuresmentioning
confidence: 99%
“…To defend against this type of attacks, previous works [3,4,5] either detect the vulnerability by dynamically monitoring session values or protect the users by introducing additional SIDs that complement the already existing authentication mechanism. However, dynamic approaches are limited, in the sense that only certain attack scenarios are tested.…”
Section: Introductionmentioning
confidence: 99%