Beamauth: two-factor web authentication with a bookmark
Proceedings of the 14th ACM conference on Computer and communications security
Combating click fraud via premium clicks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Sessionlock: securing web sessions against eavesdropping
Proceedings of the 17th international conference on World Wide Web
Cookies: A deployment study and the testing implications
ACM Transactions on the Web (TWEB)
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
An evaluation of extended validation and picture-in-picture phishing attacks
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Web user behavioral profiling for user identification
Decision Support Systems
Authentication in the clouds: a framework and its application to mobile users
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens
ACM Transactions on Internet Technology (TOIT)
Preventing the revealing of online passwords to inappropriate websites with logininspector
lisa'12 Proceedings of the 26th international conference on Large Installation System Administration: strategies, tools, and techniques
Applying clustering and ensemble clustering approaches to phishing profiling
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
We know how you live: exploring the spectrum of urban lifestyles
Proceedings of the first ACM conference on Online social networks
A Method for Mobile Download Conversion Rate Measurement based on Device Fingerprinting
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
ECC-based anti-phishing protocol for cloud computing services
International Journal of Security and Networks
Hi-index | 0.00 |
Like conventional cookies, cache cookies are data objects that servers store in Web browsers. Cache cookies, however, are unintentional byproducts of protocol design for browser caches. They do not enjoy any explicit interface support or security policies. In this paper, we show that despite limitations, cache cookies can play a useful role in the identification and authentication of users. Many users today block conventional cookies in their browsers as a privacy measure. The cache-cookie tools we propose can help restore lost usability and convenience to such users while maintaining good privacy. As we show, our techniques can also help combat online security threats such as phishing and pharming that ordinary cookies cannot. The ideas we introduce for cache-cookie management can strengthen ordinary cookies as well. The full version of this paper may be referenced at www.ravenwhite.com.