Protecting Session Credentials: A New Approach by Google Chrome
Google Develops New Protocol to Counter Cookie Theft
Google has introduced a novel approach called Device Bound Session Credentials (DBSC) to combat the widespread issue of cookie theft.
-
The Problem of Cookie Theft
-
Cookie theft follows a predictable pattern. Malware infects a device, extracts authentication cookies, and exfiltrates them to an attacker-controlled server. Since cookies often have extended lifetimes, attackers can access accounts without needing passwords, and then sell the stolen credentials on the black market.
-
By gaining access to a machine, malware can easily read local files and memory where browsers store authentication cookies.
-
How DBSC Works
-
DBSC uses hardware-backed security modules, such as the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS, to generate a unique public-private key pair per device.
-
When a session is active, the browser must prove possession of the corresponding private key to the server before issuing new session cookies.
-
These cookies are designed to be short-lived, expiring quickly if an attacker attempts to reuse them without the private key.
-
Benefits of DBSC
-
This protocol allows both large and small websites to seamlessly integrate secure, hardware-bound sessions into their systems by adding dedicated registration and refresh endpoints to their backends.
-
The browser handles the complex cryptography and cookie rotation behind the scenes, allowing the web application to continue using standard cookies for access as usual.
-
Industry Involvement and Future Development
-
DBSC was developed through the W3C process and adopted by the Web Application Security Working Group.
-
Google collaborated with Microsoft on the standard’s design and conducted two Origin Trials over the past year to gather feedback from the broader web community.
-
Okta contributed feedback on whether the protocol meets their operational requirements.
