Shpf: Enhancing http (s) session security with browser fingerprinting

T Unger, M Mulazzani, D Frühwirt… - 2013 International …, 2013 - ieeexplore.ieee.org
T Unger, M Mulazzani, D Frühwirt, M Huber, S Schrittwieser, E Weippl
2013 International Conference on Availability, Reliability and …, 2013ieeexplore.ieee.org
Session hijacking has become a major problem in today's Web services, especially with the
availability of free off-the-shelf tools. As major websites like Facebook, You tube and Yahoo
still do not use HTTPS for all users by default, new methods are needed to protect the users'
sessions if session tokens are transmitted in the clear. In this paper we propose the use of
browser fingerprinting for enhancing current state-of-the-art HTTP (S) session management.
Monitoring a wide set of features of the user's current browser makes session hijacking …
Session hijacking has become a major problem in today's Web services, especially with the availability of free off-the-shelf tools. As major websites like Facebook, You tube and Yahoo still do not use HTTPS for all users by default, new methods are needed to protect the users' sessions if session tokens are transmitted in the clear. In this paper we propose the use of browser fingerprinting for enhancing current state-of-the-art HTTP(S) session management. Monitoring a wide set of features of the user's current browser makes session hijacking detectable at the server and raises the bar for attackers considerably. This paper furthermore identifies HTML5 and CSS features that can be used for browser fingerprinting and to identify or verify a browser without the need to rely on the User Agent string. We implemented our approach in a framework that is highly configurable and can be added to existing Web applications and server-side session management with ease.
ieeexplore.ieee.org