Authentication cookies allow for convenient online user authentication, but potential security prob-lems may be encountered if a malicious adversary were able to obtain a given user’s authentication cookie. The Firefox add-on, Firesheep, and cross-site scripting methods have demonstrated that attackers are capable of achieving this goal. In this study, we hope to survey user logins across the Web in order to evaluate the vulnerability of user accounts on major websites and to gain insight on potential defenses. Our approach consists of running two browser profile instances per site: a primary crawler and a shadow crawler. For every website, the primary profile performs a legitimate login and saves the persistent cookies. The secondary profi...
Password theft and identity fraud are a challenging problem to deal with when using Internet service...
Session cookies constitute one of the main attack targets against client authentication on the Web. ...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
Summarization: In this paper, we focus on authentication and authorization flaws in web apps that en...
Client authentication on the web has remained in the internet-equivalent of the stone ages for the l...
International audienceBrowser fingerprinting has established itself as a stateless technique to iden...
Browser-based defenses have recently been advocated as an effective mechanism to protect potentially...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
In the modern day there exist many different ways that someone can steal your authentication cookies...
Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache...
Browser-based defenses have recently been advocated as an effective mechanism to protect web applica...
Browser-based defenses have recently been advocated as an effective mechanism to protect potentially...
The use of web browser cookies has become quite prevalent online. Cookies follow internet users ever...
Password theft and identity fraud are a challenging problem to deal with when using Internet service...
Session cookies constitute one of the main attack targets against client authentication on the Web. ...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
Summarization: In this paper, we focus on authentication and authorization flaws in web apps that en...
Client authentication on the web has remained in the internet-equivalent of the stone ages for the l...
International audienceBrowser fingerprinting has established itself as a stateless technique to iden...
Browser-based defenses have recently been advocated as an effective mechanism to protect potentially...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
In the modern day there exist many different ways that someone can steal your authentication cookies...
Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache...
Browser-based defenses have recently been advocated as an effective mechanism to protect web applica...
Browser-based defenses have recently been advocated as an effective mechanism to protect potentially...
The use of web browser cookies has become quite prevalent online. Cookies follow internet users ever...
Password theft and identity fraud are a challenging problem to deal with when using Internet service...
Session cookies constitute one of the main attack targets against client authentication on the Web. ...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...