Rotten cellar: Security and privacy of the browser cache revisited

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Web browsers use HTTP caches to reduce the amount of data to be transferred over the network and allow Web pages to load faster. Content such as scripts, images, and style sheets, which are static most of the time or shared across multiple websites, are stored and loaded locally when recurring requests ask for cached resources. This behaviour can be exploited if the cache is based on a naive implementation. This paper summarises possible attacks on the browser cache and shows through extensive experiments that even modern web browsers still do not provide enough safeguards to protect their users. Moreover, the available built-in as well as addable cache controls offer rather limited functionality in terms of protection and ease of use. Due to the volatile and inhomogeneous APIs for controlling the cache in modern browsers, the development of enhanced user-centric cache controls remains—until further notice—in the hands of browser manufacturers.

Author supplied keywords

Cite

CITATION STYLE

APA

Dehling, F., Mengel, T., & Lo Iacono, L. (2019). Rotten cellar: Security and privacy of the browser cache revisited. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11875 LNCS, pp. 20–36). Springer. https://doi.org/10.1007/978-3-030-35055-0_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free