A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology

被引:0
作者
Yan, Yiming [1 ]
Zhao, Haiyong [2 ]
Qu, Haipeng [1 ]
机构
[1] Ocean Univ China, Fac Informat Sci & Engn, Qingdao 266000, Peoples R China
[2] Liaocheng Univ, Sch Comp Sci & Technol, Liaocheng 252000, Peoples R China
关键词
browser fingerprints; browser cache side-channel technology; authentication; ATTACKS;
D O I
10.3390/electronics13142728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Users encounter various threats, such as cross-site scripting attacks and session hijacking, when they perform login operations in the browser. These attacks pose significant risks to the integrity and confidentiality of personal data. The browser fingerprint, as an authentication technique, can effectively enhance user security. However, attackers can bypass browser fingerprint authentication through phishing attacks and other methods, leading to unauthorized logins. To address these issues, we propose a secure browser fingerprint authentication scheme that integrates the data of the browser cache side-channel into the traditional browser fingerprint. Consequently, it enhances the dynamics and non-determinism of the browser fingerprint and improves the anti-attack capabilities of the authentication process. Experimental results demonstrate that this scheme can effectively mitigate phishing attacks and man-in-the-middle attacks, achieving a 95.33% recognition rate for attackers and a 96.17% recall rate for authorized users.
引用
收藏
页数:17
相关论文
共 44 条
[1]  
Al Kabir M.A., Adaptive risk-based passwordless authentication: a Fido2 integrated approach for enhanced security and usability
[2]   Phishing Attacks Survey: Types, Vectors, and Technical Approaches [J].
Alabdan, Rana .
FUTURE INTERNET, 2020, 12 (10) :1-39
[3]   Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods [J].
Alaca, Furkan ;
van Oorschot, P. C. .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :289-301
[4]   Phishing Attacks: A Recent Comprehensive Study and a New Anatomy [J].
Alkhalil, Zainab ;
Hewage, Chaminda ;
Nawaf, Liqaa ;
Khan, Imtiaz .
FRONTIERS IN COMPUTER SCIENCE, 2021, 3
[5]   A Large-scale Empirical Analysis of Browser Fingerprints Properties forWeb Authentication [J].
Andriamilanto, Nampoina ;
Allard, Tristan ;
Le Guelvouit, Gaetan ;
Garel, Alexandre .
ACM TRANSACTIONS ON THE WEB, 2022, 16 (01)
[6]  
Andriamilanto N, 2021, ADV INTELL SYST COMP, V1195, P161, DOI 10.1007/978-3-030-50399-4_16
[7]   BrFAST: a Tool to Select Browser Fingerprinting Attributes for Web Authentication According to a Usability-Security Trade-off [J].
Andriamilanto, Nampoina ;
Allard, Tristan .
WEB CONFERENCE 2021: COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2021), 2021, :701-704
[8]   FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms [J].
Andriamilanto, Nampoina ;
Allard, Tristan ;
Le Guelvouit, Gaetan .
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, :627-642
[9]  
Bazm MM, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P7, DOI 10.1109/FMEC.2018.8364038
[10]   Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild [J].
Bursztein, Elie ;
Benko, Borbala ;
Margolis, Daniel ;
Pietraszek, Tadek ;
Archer, Andy ;
Aquino, Allan ;
Pitsillidis, Andreas ;
Savage, Stefan .
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14), 2014, :347-358