Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering 2015
DOI: 10.1145/2786805.2786821
|View full text |Cite
|
Sign up to set email alerts
|

Auto-patching DOM-based XSS at scale

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…Other work, building upon a system for detecting DOM XSS vulnerabilities using browser-agnostic taint tracking [29], provided a method to track taint information and inject an extension that sanitizes injected strings at run time just before those strings are inserted into the sensitive sink functions [28]. The browser-agnostic framework allows detecting vulnerabilities that are specific to certain browsers; however, such vulnerabilities account for a small fraction of all vulnerabilities [29].…”
Section: Finding Dom Xss Vulnerabilities Using Taint Trackingmentioning
confidence: 99%
“…Other work, building upon a system for detecting DOM XSS vulnerabilities using browser-agnostic taint tracking [29], provided a method to track taint information and inject an extension that sanitizes injected strings at run time just before those strings are inserted into the sensitive sink functions [28]. The browser-agnostic framework allows detecting vulnerabilities that are specific to certain browsers; however, such vulnerabilities account for a small fraction of all vulnerabilities [29].…”
Section: Finding Dom Xss Vulnerabilities Using Taint Trackingmentioning
confidence: 99%
“…Similarly to server-side defences, taint-tracking has been applied at the client-side: DexterJS provides a robust, browserindependent platform for auto-patching DOM-based XSS [32,33]. While this approach effectively defends against a large number of attacks automatically, it only covers a subset of possible XSS attack.…”
Section: Related Workmentioning
confidence: 99%
“…Parsing Java Script codes on the client-side can crawl pages in Ajax applications [31]. The crawled XSS vulnerabilities can be automatically repaired [32].Analyzing the source codes of Web applications may find more injection points than the crawling method [12].…”
Section: Key Technologies Of Xss Attack Detection Injection Point Anamentioning
confidence: 99%