Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417869
|View full text |Cite
|
Sign up to set email alerts
|

The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(26 citation statements)
references
References 45 publications
0
25
0
1
Order By: Relevance
“…Relying on https is key to providing protection for any traffic between a web browser and the server. Studies conducted by Sivakorn et al [30], [31], Drakonakis et al [3] and Englehardt et al [5] confirm the problematic situation of websites not properly deploying https. These studies conclude that websites which do not, or only partially, deploy https expose private information to attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Relying on https is key to providing protection for any traffic between a web browser and the server. Studies conducted by Sivakorn et al [30], [31], Drakonakis et al [3] and Englehardt et al [5] confirm the problematic situation of websites not properly deploying https. These studies conclude that websites which do not, or only partially, deploy https expose private information to attackers.…”
Section: Related Workmentioning
confidence: 99%
“…We audit the security of web sessions against the traditional threats posed by web attackers and network attackers, the standard attacker models of the web security literature [12], which have been commonly used in previous web session security studies, e.g., [13,14,8,15,1,16,17,9]. A web attacker is an unprivileged web user who operates a browser and has control of a malicious website.…”
Section: Threat Modelmentioning
confidence: 99%
“…A significant benefit of this approach is its general applicability, as it does not require SSO availability. In a recent study [9], this approach was used to login on 23,176 sites (out of 1.6M sites, 1.6%). A major downside to automatic registration is that the registration process is a critical security feature of websites frequently targeted for automated attack.…”
Section: Crowd-sourcing Credentialsmentioning
confidence: 99%
See 2 more Smart Citations