Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache cookies, however, are unintentional byproducts of protocol design for browser caches. They do not enjoy any explicit inter-face support or security policies. In this paper, we show that despite limitations, cache cookies can play a useful role in the identification and authentication of users. Many users today block conven-tional cookies in their browsers as a privacy measure. The cache-cookie tools we propose can help restore lost usability and convenience to such users while maintain-ing good privacy. As we show, our techniques can also help combat online security threats such as phishing and pharming that ordinary cookies cannot. The idea...
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preservin...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user...
Abstract—Like conventional cookies, cache cookies are data objects that servers store in Web browser...
Distributed caching is increasingly used to shorten the response time of Web servers and balance the...
In the modern day there exist many different ways that someone can steal your authentication cookies...
Authentication cookies allow for convenient online user authentication, but potential security prob-...
Web browsers use HTTP caches to reduce the amount of data to be transferred over the network and all...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
Theft of browser authentication cookies is a serious security problem. Cookies stolen, e.g., by copy...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
Many browser cache attacks have been proposed in the literature to sniff the user’s browsing history...
Browser-based defenses have recently been advocated as an effective mechanism to protect web applica...
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preservin...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user...
Abstract—Like conventional cookies, cache cookies are data objects that servers store in Web browser...
Distributed caching is increasingly used to shorten the response time of Web servers and balance the...
In the modern day there exist many different ways that someone can steal your authentication cookies...
Authentication cookies allow for convenient online user authentication, but potential security prob-...
Web browsers use HTTP caches to reduce the amount of data to be transferred over the network and all...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
Theft of browser authentication cookies is a serious security problem. Cookies stolen, e.g., by copy...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
Many browser cache attacks have been proposed in the literature to sniff the user’s browsing history...
Browser-based defenses have recently been advocated as an effective mechanism to protect web applica...
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preservin...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user...