{"title":"Cookies and Sessions: A Study of What They Are, How They Work and How They Can Be Stolen","authors":"Kenneth P. LaCroix, Yin L. Loo, Young B. Choi","doi":"10.1109/ICSSA.2017.9","DOIUrl":null,"url":null,"abstract":"We discuss cookies, a vital and relevant piece of technology that is used by many on the Internet today. Specifically, we talk about what a cookie is, how they work and how a cookie may be stolen from an end user to gain illegitimate access to accounts. A lab, utilized for both testing and demonstration consists of an attacker and a victim. Finally, we discuss mitigation techniques for end users.","PeriodicalId":307280,"journal":{"name":"2017 International Conference on Software Security and Assurance (ICSSA)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Software Security and Assurance (ICSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSA.2017.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
We discuss cookies, a vital and relevant piece of technology that is used by many on the Internet today. Specifically, we talk about what a cookie is, how they work and how a cookie may be stolen from an end user to gain illegitimate access to accounts. A lab, utilized for both testing and demonstration consists of an attacker and a victim. Finally, we discuss mitigation techniques for end users.