2011
DOI: 10.1007/978-3-642-23822-2_9
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Analysis of XSS Sanitization in Web Application Frameworks

Abstract: Abstract. While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard defense mechanism. By streamlining and automating XSS sanitization, web application frameworks stand in a good position to stop XSS but have received little research attention. In order to drive research on web frameworks, we systematically study the security of the XSS sanitization abstractions frameworks provide. We develo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
89
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 88 publications
(92 citation statements)
references
References 19 publications
0
89
0
1
Order By: Relevance
“…Thus, the XSS flaw is as a result of not validated or sanitized input parameters. There are three types of XSS: Non-Persistent, called Reflected XSS; Persistent or Stored XSS; and Document Object Model (DOM)-based [16].…”
Section: Cross Site Scripting Vulnerabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the XSS flaw is as a result of not validated or sanitized input parameters. There are three types of XSS: Non-Persistent, called Reflected XSS; Persistent or Stored XSS; and Document Object Model (DOM)-based [16].…”
Section: Cross Site Scripting Vulnerabilitymentioning
confidence: 99%
“…XSS attacks are usually divided into three categories: NonPersistent or Reflected XSS Attack; Persistent or Stored XSS Attack; and DOM-Based XSS Attack [16].…”
Section: Exploiting Xss Vulnerabilitymentioning
confidence: 99%
“…In [22] author proposed the initial explanation of command injection attacks in the perception of web applications, and dispenses absolute algorithm for preventing them founded on context-free grammars and compiler parsing techniques. Author"s assessment is that, for an attack to be successful, the input that gets circulated into the database query or the output document must modify the intended syntactic organization of the query or document.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Web application development usually give auto sanitization options a recent study [22] shows, they still cannot meet the entire necessities exhibit by trendy internet applications. Designing and reasoning context-sensitive sanitization routines still need substantial work.…”
Section: Research Scopementioning
confidence: 99%
“…Due to the great destructiveness of XSS, many security researchers began to study various prevention methods [9][10][11]. As in 2010, Bateset al proposed a new filtering technology.…”
Section: Introductionmentioning
confidence: 99%