In the modern day there exist many different ways that someone can steal your authentication cookies. Each of those ways needs to be mitigated through many different solutions. Would it not be better if instead of preventing theft, we could prevent the use of stolen cookies? This thesis therefore researches both existing and novel solutions that could be implemented to prevent stolen cookies from being used by third parties. The existing solutions are the Secure Cookie Scheme, One-Time Cookies, Origin-Bound Certificates, and the novel solutions, Fingerprinting and Challenge-Response. These solutions are compared through a conceptual analysis of their security benefits and a performance analysis. From these analyses is found that ideally the...
The standard solution for mutual authentication between human users and servers on the Internet is t...
Research area: Information Security and Cryptography, Networking and CommunicationsResearch topic: I...
Client authentication on the web has remained in the internet-equivalent of the stone ages for the l...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
The cross-site scripting attack is widely prevalent and a number of real world attacks have been re-...
Authentication cookies allow for convenient online user authentication, but potential security prob-...
Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache...
Theft of browser authentication cookies is a serious security problem. Cookies stolen, e.g., by copy...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
Abstract—Like conventional cookies, cache cookies are data objects that servers store in Web browser...
Abstract: In early days, web pages always use a state for keeping an authentication state between br...
Summarization: In this paper, we focus on authentication and authorization flaws in web apps that en...
Session cookies constitute one of the main attack targets against client authentication on the Web. ...
The standard solution for mutual authentication between human users and servers on the Internet is t...
Research area: Information Security and Cryptography, Networking and CommunicationsResearch topic: I...
Client authentication on the web has remained in the internet-equivalent of the stone ages for the l...
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Interne...
XSS attacks are the number one attacks in the Web applications. Web applications are becoming the do...
The cross-site scripting attack is widely prevalent and a number of real world attacks have been re-...
Authentication cookies allow for convenient online user authentication, but potential security prob-...
Like conventional cookies, cache cookies are data ob-jects that servers store in Web browsers. Cache...
Theft of browser authentication cookies is a serious security problem. Cookies stolen, e.g., by copy...
The web has become a new, highly interactive medium. Many modern websites provide their users with t...
Modern websites set multiple authentication cookies during the login process to allow users to rema...
Abstract—Like conventional cookies, cache cookies are data objects that servers store in Web browser...
Abstract: In early days, web pages always use a state for keeping an authentication state between br...
Summarization: In this paper, we focus on authentication and authorization flaws in web apps that en...
Session cookies constitute one of the main attack targets against client authentication on the Web. ...
The standard solution for mutual authentication between human users and servers on the Internet is t...
Research area: Information Security and Cryptography, Networking and CommunicationsResearch topic: I...
Client authentication on the web has remained in the internet-equivalent of the stone ages for the l...