Jump to content
Nytro

One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication

Recommended Posts

Posted

One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens

Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad and Patrick Traynor

Converging Infrastructure Security (CISEC) Laboratory

Georgia Institute of Technology

{idacosta@, schakradeo@, mustaq@cc., traynor@cc.}gatech.edu

Abstract

HTTP cookies are the de facto mechanism for session authentication in web applications. However,

their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended

to protect cookies, but deploying full HTTPS support can be challenging due to performance

and financial concerns, especially for highly distributed applications. Moreover, cookies can be exposed

in a variety of ways even when HTTPS is enabled. In this paper, we propose One-Time Cookies (OTC),

a more robust alternative for session authentication. OTC prevents attacks such as session hijacking by

signing each user request with a session secret securely stored in the browser. Unlike other proposed

solutions, OTC does not require expensive state synchronization in the web application, making it easily

deployable in highly distributed systems. We implemented OTC as a plugin for the popular WordPress

platform and as an extension for Firefox and Firefox for mobile browsers. Our extensive experimental

analysis shows that OTC introduces a latency of less than 6 ms when compared to cookies - a negligible

overhead for most web applications. Moreover, we show that OTC can be combined with HTTPS to

effectively add another layer of security to web applications. In so doing, we demonstrate that One-Time

Cookies can significantly improve the security of web applications with minimal impact on performance

and scalability.

Download:

https://smartech.gatech.edu/jspui/bitstream/1853/42609/1/GT-CS-12-02.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...