2011
DOI: 10.1007/978-3-642-19125-1_7
|View full text |Cite
|
Sign up to set email alerts
|

SessionShield: Lightweight Protection against Session Hijacking

Abstract: Abstract. The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection with XSS is session hijacking via session identifier theft. While session hijacking is a client-side attack, the actual vulnerability resides on the server-side and, thus, has to be handled by the website's operator. In consequence, if the operator fails to address XSS, the application's users are defenseless against session… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
65
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 59 publications
(68 citation statements)
references
References 18 publications
2
65
0
1
Order By: Relevance
“…This policy gives similar guarantees as fine-grained cookie access control systems, such as SessionShield [44], that use heuristic techniques to prevent access to session cookies but allow access to other cookies.…”
Section: Can Flowfox Enforce Useful Policies?mentioning
confidence: 99%
See 1 more Smart Citation
“…This policy gives similar guarantees as fine-grained cookie access control systems, such as SessionShield [44], that use heuristic techniques to prevent access to session cookies but allow access to other cookies.…”
Section: Can Flowfox Enforce Useful Policies?mentioning
confidence: 99%
“…Scripts can leak session identifiers [44], inject requests into an ongoing session [9], sniff the user's browsing history, or track the user's behavior on a web site [29]. Such malicious scripts can enter a web page because of a cross-site scripting vulnerability [31], or because the page integrates third party scripts such as advertisements, or gadgets.…”
Section: Introductionmentioning
confidence: 99%
“…DEMACRO utilizes a techniques initially described by Nikiforakis et al [16] and Tang et al [23] that attempts to identify session identifiers at the client-side. The approach consists of two pillars.…”
Section: Plug-in Identificationmentioning
confidence: 99%
“…This session identifier technique works without the assistance of Web servers and offers excellent detection capabilities with a false negatives rate of~3% and a false-positive ratio of~0.8% [16].…”
Section: Plug-in Identificationmentioning
confidence: 99%
See 1 more Smart Citation