Cookies have emerged as one of the most convenient solutions to keep track of browsers. They continue to raise both security and privacy concerns due to their continuous evolution. There is limited support for confidentiality, integrity and authentication in the way cookies are used. In this respect, the possibilities for misusing cookies are very real and are being exploited. This paper will first discuss the pros and cons of cookies. Also, discuss the step by step process of how cookies work. This paper will discuss the preferences of users based on survey results. This paper will discuss cookie vulnerabilities, ways to exploit them, and ways to mitigate them.
CITATION STYLE
Peterson, M., & Boonthum-Denecke, C. (2019). Poster: Investigation of cookie vulnerabilities. In WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks (pp. 330–331). Association for Computing Machinery, Inc. https://doi.org/10.1145/3317549.3326316
Mendeley helps you to discover research relevant for your work.