COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
- URL: http://arxiv.org/abs/2406.05310v1
- Date: Sat, 8 Jun 2024 01:02:49 GMT
- Title: COOKIEGUARD: Characterizing and Isolating the First-Party Cookie Jar
- Authors: Pouneh Nikkhah Bahrami, Aurore Fass, Zubair Shafiq,
- Abstract summary: Third-party scripts write (or textitghost-write) first-party cookies in the browser's cookie jar because they are included in the website's main frame.
Third-party scripts are able to access all first-party cookies, both the actual first-party cookies as well as the ghost-written first-party cookies by different third-party scripts.
We propose name to introduce isolation between first-party cookies set by different third-party scripts in the main frame.
- Score: 14.314375420700504
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As third-party cookies are going away, first-party cookies are increasingly being used for tracking. Prior research has shown that third-party scripts write (or \textit{ghost-write}) first-party cookies in the browser's cookie jar because they are included in the website's main frame. What is more is that a third-party script is able to access all first-party cookies, both the actual first-party cookies as well as the ghost-written first-party cookies by different third-party scripts. Existing isolation mechanisms in the web browser such as SOP and CSP are not designed to address this lack of isolation between first-party cookies written by different third-parties. We conduct a comprehensive analysis of cross-domain first-party cookie retrieval, exfiltration, and modification on top-10K websites. Most notably, we find 18\% and 4\% of the first-party cookies are exfiltrated and overwritten, respectively, by cross-domain third-party scripts. We propose \name to introduce isolation between first-party cookies set by different third-party scripts in the main frame. To this end, \name intercepts cookie get and set operations between third-party scripts and the browser's cookie jar to enforce strict isolation between first-party cookies set by different third-party domains. Our evaluation of \name shows that it effectively blocks all cross-domain cookie read/write operations to provide a fully isolated cookie jar. While it generally does not impact appearance, navigation, or other website functionality, the strict isolation policy disrupts Single Sign-On (SSO) on just 11\% of websites that rely on first-party cookies for session management. Our work demonstrates the feasibility of isolating first-party cookies.
Related papers
- Differential Privacy on Trust Graphs [54.55190841518906]
We study differential privacy (DP) in a multi-party setting where each party only trusts a (known) subset of the other parties with its data.
We give a DP algorithm for aggregation with a much better privacy-utility trade-off than in the well-studied local model of DP.
arXiv Detail & Related papers (2024-10-15T20:31:04Z) - Browsing without Third-Party Cookies: What Do You See? [5.181502547611254]
Third-party web cookies are often used for privacy-invasive behavior tracking.
To understand the effects of such third-party cookieless browsing, we crawled and measured the top 10,000 Tranco websites.
We develop a framework to remove third-party cookies and analyze the differences between the appearance of web pages with and without these cookies.
arXiv Detail & Related papers (2024-10-14T17:47:43Z) - A first look into Utiq: Next-generation cookies at the ISP level [3.434440572295625]
Third-party cookies have been widely used for years, they have also been criticized for their potential impact on user privacy.
Many browsers allow users to block third-party cookies, which limits their usefulness for advertisers.
We take a first look at Utiq, a new way of user tracking performed directly by the ISP, to substitute the third-party cookies.
arXiv Detail & Related papers (2024-05-15T09:23:59Z) - Towards Browser Controls to Protect Cookies from Malicious Extensions [5.445001663133085]
Cookies are valuable targets of attacks that attempt to steal them and gain unauthorized access to user accounts.
Extensions are third-party HTML/JavaScript add-ons with access to several privileged APIs and can run on multiple websites at once.
We propose browser controls based on two new cookie attributes that protect cookies from malicious extensions: BrowserOnly and Tracked.
arXiv Detail & Related papers (2024-05-10T22:04:56Z) - Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training [55.321010757641524]
A major public concern regarding the training of large language models (LLMs) is whether they abusing copyrighted online text.
Previous membership inference methods may be misled by similar examples in vast amounts of training data.
We propose an alternative textitinsert-and-detection methodology, advocating that web users and content platforms employ textbftextitunique identifiers.
arXiv Detail & Related papers (2024-03-23T06:36:32Z) - A Quantitative Information Flow Analysis of the Topics API [0.34952465649465553]
We analyze the re-identification risk for individual Internet users introduced by the Topics API from the perspective of information- and decision-theoretic framework.
Our model allows a theoretical analysis of both privacy and utility aspects of the API and their trade-off, and we show that the Topics API does have better privacy than third-party cookies.
arXiv Detail & Related papers (2023-09-26T08:14:37Z) - Tiered Reinforcement Learning: Pessimism in the Face of Uncertainty and
Constant Regret [144.06550139857296]
We propose a new learning framework that captures the tiered structure of many real-world user-interaction applications.
We simultaneously maintain two policies $pitextO$ and $pitextE$.
We show that if choosing Pessimistic Value It as the exploitation algorithm to produce $pitextE$, we can achieve a constant regret for risk-averse users.
arXiv Detail & Related papers (2022-05-25T00:03:25Z) - Cross-lingual Adaptation for Recipe Retrieval with Mixup [56.79360103639741]
Cross-modal recipe retrieval has attracted research attention in recent years, thanks to the availability of large-scale paired data for training.
This paper studies unsupervised domain adaptation for image-to-recipe retrieval, where recipes in source and target domains are in different languages.
A novel recipe mixup method is proposed to learn transferable embedding features between the two domains.
arXiv Detail & Related papers (2022-05-08T15:04:39Z) - One-shot Key Information Extraction from Document with Deep Partial
Graph Matching [60.48651298832829]
Key Information Extraction (KIE) from documents improves efficiency, productivity, and security in many industrial scenarios.
Existing supervised learning methods for the KIE task need to feed a large number of labeled samples and learn separate models for different types of documents.
We propose a deep end-to-end trainable network for one-shot KIE using partial graph matching.
arXiv Detail & Related papers (2021-09-26T07:45:53Z) - User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent
to Track Users [3.936965297430477]
We investigate whether websites use persistent and sophisticated forms of tracking in order to track users who said they do not want cookies.
Our results suggest that websites do use such modern forms of tracking even before users had the opportunity to register their choice with respect to cookies.
As a result, users' choices play very little role with respect to tracking.
arXiv Detail & Related papers (2021-02-17T14:11:10Z) - UniConv: A Unified Conversational Neural Architecture for Multi-domain
Task-oriented Dialogues [101.96097419995556]
"UniConv" is a novel unified neural architecture for end-to-end conversational systems in task-oriented dialogues.
We conduct comprehensive experiments in dialogue state tracking, context-to-text, and end-to-end settings on the MultiWOZ2.1 benchmark.
arXiv Detail & Related papers (2020-04-29T16:28:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.