Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies

被引:0
作者
Franken, Gertjan [1 ]
Van Goethem, Tom [1 ]
Joosen, Wouter [1 ]
机构
[1] Katholieke Univ Leuven, Imec DistriNet, Leuven, Belgium
来源
PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM | 2018年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cookies are the most prominent mechanism to identify and authenticate users on the Internet. Although protected by the Same Origin Policy, popular browsers include cookies in all requests, even when these are cross-site. Unfortunately, these third-party cookies enable both cross-site attacks and third-party tracking. As a response to these nefarious consequences, various countermeasures have been developed in the form of browser extensions or even protection mechanisms that are built directly into the browser. In this paper, we evaluate the effectiveness of these defense mechanisms by leveraging a framework that automatically evaluates the enforcement of the policies imposed to third-party requests. By applying our framework, which generates a comprehensive set of test cases covering various web mechanisms, we identify several flaws in the policy implementations of the 7 browsers and 46 browser extensions that were evaluated. We find that even built-in protection mechanisms can be circumvented by multiple novel techniques we discover. Based on these results, we argue that our proposed framework is a much-needed tool to detect bypasses and evaluate solutions to the exposed leaks. Finally, we analyze the origin of the identified bypass techniques, and find that these are due to a variety of implementation, configuration and design flaws.
引用
收藏
页码:151 / 168
页数:18
相关论文
共 39 条
[1]   The Web Never Forgets: Persistent Tracking Mechanisms in the Wild [J].
Acar, Gunes ;
Eubank, Christian ;
Englehardt, Steven ;
Juarez, Marc ;
Narayanan, Arvind ;
Diaz, Claudia .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :674-689
[2]  
Aggarwal G., 2010, USENIX SECURITY 10, P6
[3]  
[Anonymous], 2010, 5988 RFC
[4]  
[Anonymous], LECT NOTES COMPUTER
[5]  
Ayenson M., 2009, Flash Cookies and Privacy II: Now with HTML5 and ET AG Respawning
[6]  
Barth A., 2011, document RFC 6265
[7]  
Barth A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P75
[8]  
BLOG M., 2015, FIREFOX NOW OFFERS M
[9]  
BLOG M. S., 2018, SUPPORTING SAME SITE
[10]  
Bortz Andrew., 2007, INT C WORLD WIDE WEB, P621, DOI [10 .1145/1242572.1242656, DOI 10.1145/1242572.1242656]