2015
DOI: 10.1007/s13198-015-0376-0
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
85
0
5

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 166 publications
(90 citation statements)
references
References 27 publications
0
85
0
5
Order By: Relevance
“…According to the 10 leading vulnerabilities rankings presented by the Open Web Application Security Project (OWASP), the XSS vulnerability can be termed among the top web application vulnerabilities [2,4]. Shar and Tan [9] employed the static analysis methodology on Java web applications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…According to the 10 leading vulnerabilities rankings presented by the Open Web Application Security Project (OWASP), the XSS vulnerability can be termed among the top web application vulnerabilities [2,4]. Shar and Tan [9] employed the static analysis methodology on Java web applications.…”
Section: Related Workmentioning
confidence: 99%
“…XSS can trigger major damages for the user or at the site by inserting the malicious scripts into the place where a web application admits user inputs. Inputs that are invalidated can cause transferring of private data, and stealing of cookies and user accounts [2,4]. In other words, the XSS flaw is triggered by un-sanitised or un-validated input parameters.…”
Section: Cross-site Scripting (Xss)mentioning
confidence: 99%
See 1 more Smart Citation
“…The report gives information about the number of vulnerabilities for every web technology [17]. A study covering the entire web applications noted that XSS accounts for 25 percent of the vulnerabilities [18]. [18] XSS offers an opening to the invader or hacker to enter the webserver database, mutilate websites, seize the web browser of a user remotely, and compel him/her to take an unfamiliar route [18].…”
Section: Web Application Securitymentioning
confidence: 99%
“…A study covering the entire web applications noted that XSS accounts for 25 percent of the vulnerabilities [18]. [18] XSS offers an opening to the invader or hacker to enter the webserver database, mutilate websites, seize the web browser of a user remotely, and compel him/her to take an unfamiliar route [18]. Veracode's state of software security report emphasised on application development and scrutinised over 200,000 individual applications from the period October 2013 to March 2015 [16].…”
Section: Web Application Securitymentioning
confidence: 99%