2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014) 2014
DOI: 10.1109/icspct.2014.6884928
|View full text |Cite
|
Sign up to set email alerts
|

Browser's defenses against reflected cross-site scripting attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In [5], the limitations of anti-XSS approach implemented in different browsers for reflected XSS attacks against several categories of vulnerabilities are addressed properly and witnessed that Mozilla Firefox with XSS-Me discovers greater percentage of exploits than other browsers. To defend against the discovered exploits in this add-on, this paper proposes a blocking technique so that it can be treated as a propitious anti-XSS filter, if integrated inside the browser instead being applied as an extension.…”
Section: Approach Of Xss-mementioning
confidence: 99%
See 4 more Smart Citations
“…In [5], the limitations of anti-XSS approach implemented in different browsers for reflected XSS attacks against several categories of vulnerabilities are addressed properly and witnessed that Mozilla Firefox with XSS-Me discovers greater percentage of exploits than other browsers. To defend against the discovered exploits in this add-on, this paper proposes a blocking technique so that it can be treated as a propitious anti-XSS filter, if integrated inside the browser instead being applied as an extension.…”
Section: Approach Of Xss-mementioning
confidence: 99%
“…Furthermore, how and what part of the parameter is perilous to forward to provide response to the web browser. Therefore, for the identification of malicious code, XSS-Me is the best in its work as discussed in [5]. The challenging part of our contribution is to recognize and stop the execution of the malicious parameters.…”
Section: Proposed Defense Mechanismmentioning
confidence: 99%
See 3 more Smart Citations