A XSS Defensive Scheme Based on Behavior Certification

Article Preview

Abstract:

The Scripting languages (mostly JavaScript) applications in the network are heavily used to improve the user experience now. The trends make XSS (Cross-site Scripting Attacks) the most serious security problems in the current Internet. A XSS defensive scheme based on behavior certification is proposed in the paper. The website behavior model is generated based on the website logic and the user behavior. The browsing behavior certification is implemented based on the expected behavior of the resulting model, so as to offer security for the client even in the case that web server has suffered XSS attacks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2365-2369

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic. Noxes: A Client-Side Solution for Mitigating Cross Site Scripting Attacks. Proceedings of the 21st ACM Symposium on Applied Computing, (2006).

DOI: 10.1145/1141277.1141357

Google Scholar

[2] O. Hallaraker and G. Vigna. Detecting Malicious JavaScript Code in Mozilla. In Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, (2005).

DOI: 10.1109/iceccs.2005.35

Google Scholar

[3] O. Ismail, M. Etoh, Y. Kadobayashi, and S. Yamaguchi. A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. Proceedings of the International Conference on Advanced Information Networking and Application, (2004).

DOI: 10.1109/aina.2004.1283902

Google Scholar

[4] P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. Proceedings of the Network and Distributed System Security Symposium, (2007).

DOI: 10.1016/j.cose.2009.04.008

Google Scholar

[5] T. Jim and N. Swamy and M. Hicks. BEEP: Browser-Enforced Embedded Policies. In 16th International World Wide Web Conference (WWW2007), Banff, (2007).

DOI: 10.1145/1242572.1242654

Google Scholar