Lecture 11
Suppose you are helping the developers of a complex web site at
http://bitdiddle.com/ to evaluate their security. This web site
uses an HTTP cookie to authenticate users. The site developers
are worried an adversary might steal the cookie from one of the
visitors to the site, and use that cookie to impersonate the
victim visitor.
What should the developers look at in order to determine if
a user's cookie can be stolen by an adversary? In other words,
what kinds of adversaries might be able to steal the cookie of one
of the visitors to http://bitdiddle.com/, what goes "wrong"
to allow the adversary to obtain the cookie, and how might the
developers prevent it?
Note: an exhaustive answer might be quite long, so you
can stop after about 5 substantially-different issues that the
developers have to consider.