Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

(In-)Security of Cookies in HTTPS: Cookie Theft by Removing Cookie Flags

Authors
Kwon, HyunsooNam, HyunjaeLee, SangtaeHahn, ChangheeHur, Junbeom
Issue Date
2020
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Cookie theft attack; SSL/TLS; hypertext transfer protocol
Citation
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.1204 - 1215
Indexed
SCIE
SCOPUS
Journal Title
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Volume
15
Start Page
1204
End Page
1215
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/58924
DOI
10.1109/TIFS.2019.2938416
ISSN
1556-6013
Abstract
HyperText Transfer Protocol (HTTP) cookies are widely used on the web to enhance communication efficiency between a client and a server by storing stateful information. However, cookies may contain private and sensitive information about users. Thus, in order to guarantee the security of cookies, most web browsers and servers support not only Transport Layer Security (TLS) but also other mechanisms such as HTTP Strict Transport Security and cookie flags. However, a recent study has shown that it is possible to circumvent cookie flags in HTTPS by exploiting a vulnerability in HTTP software that allows message truncation. In this paper, we propose a novel cookie hijacking attack called rot ten cookie which deactivates cookie flags even if they are protected by TLS by exploiting a weakness in HTTP in terms of integrity checks. According to our investigation, all major browsers ignore uninterpretable sections of the header of HTTP response messages and accept incorrect formats without any rejection. We demonstrate that, when combined with TLS or application vulnerabilities, this form of attack can obtain private cookies by removing cookie flags. Thus, the attacker can impersonate a legitimate user in the eyes of the server when cookies are used as an authentication token. We prove the practicality of our attack by demonstrating that our attack can lead five major web browsers to accept a cookie without any cookie flags. We thus present a mitigation strategy for the transport layer to preserve cookie security against our attack.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE