Protecting Cookies with Device Bound Session Credentials

Google has announced public availability of Device Bound Session Credentials (DBSC) for Windows users on Chrome 146, with macOS support coming soon. DBSC cryptographically binds authentication sessions to a specific device using hardware-backed security modules like the Trusted Platform Module (TPM) on Windows and the Secure Enclave on macOS. The browser generates a unique public/private key pair that cannot be exported from the machine. Servers issue short-lived session cookies contingent on Chrome proving possession of the corresponding private key, rendering any exfiltrated cookies useless to attackers who steal them via infostealer malware such as LummaC2. DBSC shifts from reactive detection to proactive prevention, and Google has observed a significant reduction in session theft since its early rollout. The protocol preserves privacy by using distinct keys per session, preventing cross-session or cross-site correlation. DBSC was designed as an open web standard through the W3C process with input from Microsoft and industry partners, including Okta. Future improvements include securing federated identity with cross-origin bindings for SSO, advanced registration using pre-existing trusted key material, and broader device support including software-based keys.

https://security.googleblog.com/2026/04/protecting-cookies-with-device-bound.html

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

SecObserve: Simplified Vulnerability and License Management for CI/CD Pipelines