[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3317549.3326316acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

Investigation of cookie vulnerabilities: poster

Published: 15 May 2019 Publication History

Abstract

Cookies have emerged as one of the most convenient solutions to keep track of browsers. They continue to raise both security and privacy concerns due to their continuous evolution. There is limited support for confidentiality, integrity and authentication in the way cookies are used. In this respect, the possibilities for misusing cookies are very real and are being exploited. This paper will first discuss the pros and cons of cookies. Also, discuss the step by step process of how cookies work. This paper will discuss the preferences of users based on survey results. This paper will discuss cookie vulnerabilities, ways to exploit them, and ways to mitigate them.

References

[1]
David Bisson. 2017. Why it's a good idea to clear browser history and cookies. https://www.grahamcluley.com/good-idea-clear-browser-history-cookies/. (Accessed on 03/02/2019).
[2]
Interserver. 2018. What is Session Hijacking and how to prevent it? - Interserver Tips. https://www.interserver.net/tips/kb/session-hijacking-prevent/. (Accessed on 03/02/2019).
[3]
Juha Jussila. 2018. JYX - HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review. https://jyx.jyu.fi/handle/123456789/59084. (Accessed on 02/05/2019).
[4]
Yichen Liu. 2012. The Pros and Cons of Using Browser Cached Cookies: A Google Story | Internet Marketing Inc. https://www.internetmarketinginc.com/blog/the-pros-and-cons-of-cookies-a-google-story/. (Accessed on 03/026/2019).
[5]
Chris Palmer. 2008. Secure Session Management With Cookies for Web Applications. https://crypto.stanford.edu/cs142/papers/web-session-management.pdf. (Accessed on 02/10/2019).
[6]
Rodica Tirtea. 2011. Bittersweet cookies. Some security and privacy considerations --- ENISA. https://www.enisa.europa.eu/publications/copy_of_cookies. (Accessed on 02/10/2019).
[7]
Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, and Nicholas Weaver. 2015. Cookies Lack Integrity: Real-World Implications. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 707--721. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/zheng

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
May 2019
359 pages
ISBN:9781450367264
DOI:10.1145/3317549
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 2019

Check for updates

Author Tags

  1. cookies
  2. exploit
  3. personal information
  4. privacy
  5. vulnerabilities

Qualifiers

  • Poster

Conference

WiSec '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 314
    Total Downloads
  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media