Proceedings 2021 Workshop on Measurements, Attacks, and Defenses for the Web 2021
DOI: 10.14722/madweb.2021.23018
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis of First-Party Cookie Exfiltration due to CNAME Redirections

Abstract: DNS CNAME redirections, which can "steer" browser requests towards a domain different than the one in the request's URI, are a simple and oftentimes effective means to obscure the source of a web object behind an alias. These redirections can be used to make third-party content appear as first-party content. The practice of evading browser security mechanisms through misuse of CNAMEs, referred to as CNAME cloaking, has been recently growing in popularity among advertisers/trackers to bypass blocklists and priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 12 publications
2
3
0
Order By: Relevance
“…Another option for a third party to set and access cookies in a first-party context is that the first party redirects requests on DNS level to another domain ("CNAME cloaking" -see Section 3.3). Previous work has shown the extend of CNAME based tracking in the wild [9,38,11]. In this work, we show that this technique is also present in the first-party cookie tracking ecosystems, and we replicate high level results of previous work to highlight the presence of this novel tracking technique.…”
Section: First-party Cookie Tracking Via Cname Cloakingsupporting
confidence: 85%
See 3 more Smart Citations
“…Another option for a third party to set and access cookies in a first-party context is that the first party redirects requests on DNS level to another domain ("CNAME cloaking" -see Section 3.3). Previous work has shown the extend of CNAME based tracking in the wild [9,38,11]. In this work, we show that this technique is also present in the first-party cookie tracking ecosystems, and we replicate high level results of previous work to highlight the presence of this novel tracking technique.…”
Section: First-party Cookie Tracking Via Cname Cloakingsupporting
confidence: 85%
“…Our results show that CNAME cloaking is commonly used but also abused to disguise trackers, which is in line with previous work [9,38,11]. To get a better understanding of who embeds trackers that use these techniques, we analyzed the sites' rank and category in our dataset which do so.…”
Section: First-party Cookie Tracking Via Cname Cloakingsupporting
confidence: 84%
See 2 more Smart Citations
“…This technique allows trackers to share their first party cookies, because the browser is fooled into attaching cookies from the original website's subdomain rather than the third party domain it redirects to [19]. Trackers can access session cookies, even those belonging to financial institutions, this way [8,43]. In this work, we focus on redirection-based circumvention only.…”
Section: Related Workmentioning
confidence: 99%