Abstract—Like conventional cookies, cache cookies are data objects that servers store in Web browsers. Cache cookies, however, are essentially unintentional byproducts of protocol design for browser caches. They do not enjoy any explicit interface support or security policies. In this paper, we show that despite limitations, cache cookies can play a useful role in the identification and authentication of users. Many users today block con-ventional cookies in their browsers as a privacy mea-sure. The cache-cookie tools we propose can help re-store lost usability and convenience to such users while maintaining good standards for privacy. As we show, our techniques can also help combat online security threats as phishing and pharming that ordi...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
Many browser cache attacks have been proposed in the literature to sniff the user’s browsing history...
As cookies are commonly used on websites, they can constitute a significant threat to user’s privacy...
Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache...
Distributed caching is increasingly used to shorten the response time of Web servers and balance the...
Authentication cookies allow for convenient online user authentication, but potential security prob-...
Web browsers use HTTP caches to reduce the amount of data to be transferred over the network and all...
In the modern day there exist many different ways that someone can steal your authentication cookies...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
Theft of browser authentication cookies is a serious security problem. Cookies stolen, e.g., by copy...
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preservin...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
The standard solution for mutual authentication between human users and servers on the Internet is t...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
Many browser cache attacks have been proposed in the literature to sniff the user’s browsing history...
As cookies are commonly used on websites, they can constitute a significant threat to user’s privacy...
Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache...
Distributed caching is increasingly used to shorten the response time of Web servers and balance the...
Authentication cookies allow for convenient online user authentication, but potential security prob-...
Web browsers use HTTP caches to reduce the amount of data to be transferred over the network and all...
In the modern day there exist many different ways that someone can steal your authentication cookies...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
Theft of browser authentication cookies is a serious security problem. Cookies stolen, e.g., by copy...
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preservin...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
The standard solution for mutual authentication between human users and servers on the Internet is t...
Website fingerprinting attacks use statistical analysis on network traffic to compromise user privac...
Many browser cache attacks have been proposed in the literature to sniff the user’s browsing history...
As cookies are commonly used on websites, they can constitute a significant threat to user’s privacy...