2019
DOI: 10.3233/jcs-181149
|View full text |Cite
|
Sign up to set email alerts
|

Sub-session hijacking on the web: Root causes and prevention

Abstract: Since cookies act as the only proof of a user identity, web sessions are particularly vulnerable to session hijacking attacks, where the browser run by a given user sends requests associated to the identity of another user. When n > 1 cookies are used to implement a session, there might actually be n sub-sessions running at the same website, where each cookie is used to retrieve part of the state information related to the session. Sub-session hijacking breaks the ideal view of the existence of a unique user s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…Furthermore, Shepherd could be extended to identify sites whose login system exhibits specific behaviour. One example could be sites that store session identifiers in local storage instead of using cookies; another is looking for sites vulnerable so sub-session hijacking [CRB19] (which relies on presence of multiple authentication cookies).…”
Section: A Measuring Post-login Featuresmentioning
confidence: 99%
“…Furthermore, Shepherd could be extended to identify sites whose login system exhibits specific behaviour. One example could be sites that store session identifiers in local storage instead of using cookies; another is looking for sites vulnerable so sub-session hijacking [CRB19] (which relies on presence of multiple authentication cookies).…”
Section: A Measuring Post-login Featuresmentioning
confidence: 99%
“…The HWL Proxy is implemented in Go and is available as open source 3 . Note that its standard http library was not used because it is subject to vulnerabilities as well [2].…”
Section: Methodsmentioning
confidence: 99%
“…In this section, we provide an overview of semantic gap vulnerabilities in HTTP message processing as defined in Section 2. Attacks based on semantic gaps in other application layers, such as processing multiple cookies [3], are out of scope.…”
Section: Attacks Rooted In a Semantic Gapmentioning
confidence: 99%
“…Analyzing web session security requires authenticated access to web applications, which is a difficult process to automate [4]. Thus, prior work on web session security reported on either (i) small-scale precise measurements involving a significant amount of manual effort [5,6,7], or (ii) large-scale measurements based on unauthenticated access to web applications, which miss valuable information, e.g., the login and logout processes [8]. The only notable exception is a recent paper, which analyzed post-login web session security at scale, but only focused on session hijacking enabled by cookie theft [9].…”
Section: Introductionmentioning
confidence: 99%
“…The only notable exception is a recent paper, which analyzed post-login web session security at scale, but only focused on session hijacking enabled by cookie theft [9]. This means that prior web security studies are too small in terms of analyzed sites [5,6,7], too imprecise because carried out without performing authentication [8] or too narrow because they only cover a limited set of web session security threats [9]; we further discuss and compare against prior work in Section 8.…”
Section: Introductionmentioning
confidence: 99%