A user-level authentication scheme to mitigate web session-based vulnerabilities

2Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

After the initial login, web browsers authenticate to web applications by sending the session credentials with every request. Several attacks exist which exploit conceptual deficiencies of this scheme, e.g. Cross-Site Request Forgery, Session Hijacking, Session Fixation, and Clickjacking. We analyze these attacks and identify their common root causes in the browser authentication scheme and the missing user context. These root causes allow the attacker to mislead the browser and misuse the user's session context. Based on this result, we present a user authentication scheme that prohibits the exploitation of the analyzed vulnerabilities. Our mechanism works by binding image data to individual sessions and requiring submission of this data along with security-critical HTTP requests. This way, an attacker's exploitation chances are limited to a theoretically arbitrary low probability to guess the correct session image. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Braun, B., Kucher, S., Johns, M., & Posegga, J. (2012). A user-level authentication scheme to mitigate web session-based vulnerabilities. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7449 LNCS, pp. 17–29). https://doi.org/10.1007/978-3-642-32287-7_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free