Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3317549.3326316acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

Investigation of cookie vulnerabilities: poster

Published: 15 May 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Cookies have emerged as one of the most convenient solutions to keep track of browsers. They continue to raise both security and privacy concerns due to their continuous evolution. There is limited support for confidentiality, integrity and authentication in the way cookies are used. In this respect, the possibilities for misusing cookies are very real and are being exploited. This paper will first discuss the pros and cons of cookies. Also, discuss the step by step process of how cookies work. This paper will discuss the preferences of users based on survey results. This paper will discuss cookie vulnerabilities, ways to exploit them, and ways to mitigate them.

    References

    [1]
    David Bisson. 2017. Why it's a good idea to clear browser history and cookies. https://www.grahamcluley.com/good-idea-clear-browser-history-cookies/. (Accessed on 03/02/2019).
    [2]
    Interserver. 2018. What is Session Hijacking and how to prevent it? - Interserver Tips. https://www.interserver.net/tips/kb/session-hijacking-prevent/. (Accessed on 03/02/2019).
    [3]
    Juha Jussila. 2018. JYX - HTTP cookie weaknesses, attack methods and defense mechanisms : a systematic literature review. https://jyx.jyu.fi/handle/123456789/59084. (Accessed on 02/05/2019).
    [4]
    Yichen Liu. 2012. The Pros and Cons of Using Browser Cached Cookies: A Google Story | Internet Marketing Inc. https://www.internetmarketinginc.com/blog/the-pros-and-cons-of-cookies-a-google-story/. (Accessed on 03/026/2019).
    [5]
    Chris Palmer. 2008. Secure Session Management With Cookies for Web Applications. https://crypto.stanford.edu/cs142/papers/web-session-management.pdf. (Accessed on 02/10/2019).
    [6]
    Rodica Tirtea. 2011. Bittersweet cookies. Some security and privacy considerations --- ENISA. https://www.enisa.europa.eu/publications/copy_of_cookies. (Accessed on 02/10/2019).
    [7]
    Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, and Nicholas Weaver. 2015. Cookies Lack Integrity: Real-World Implications. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 707--721. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/zheng

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
    May 2019
    359 pages
    ISBN:9781450367264
    DOI:10.1145/3317549
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 May 2019

    Check for updates

    Author Tags

    1. cookies
    2. exploit
    3. personal information
    4. privacy
    5. vulnerabilities

    Qualifiers

    • Poster

    Conference

    WiSec '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 311
      Total Downloads
    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media