2016
DOI: 10.1002/sec.1433
|View full text |Cite
|
Sign up to set email alerts
|

JS‐SAN: defense mechanism for HTML5‐based web applications against javascript code injection vulnerabilities

Abstract: This paper presents an injection and clustering-based sanitization framework, i.e. JS-SAN (JavaScript SANitizer) for the mitigation of JS code injection vulnerabilities. It generates an attack vector template by performing the clustering on the extracted JS attack vector payloads corresponding to their level of similarity. As a result, it then sanitizes the extracted JS attack vector template by an automated technique of placement of sanitizers in the source code of generated templates of web applications. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…However, we did not apply any advanced sanitisation mechanisms on such suspicious JS code for alleviating the effect of JS injection vulnerabilities. In addition, we introduced another technique (Gupta and Gupta, 2016c) that integrates the XSS defensive framework of PHP-Sensor on the virtual machines of cloud platforms.…”
Section: Existing Defensive Methodologiesmentioning
confidence: 99%
“…However, we did not apply any advanced sanitisation mechanisms on such suspicious JS code for alleviating the effect of JS injection vulnerabilities. In addition, we introduced another technique (Gupta and Gupta, 2016c) that integrates the XSS defensive framework of PHP-Sensor on the virtual machines of cloud platforms.…”
Section: Existing Defensive Methodologiesmentioning
confidence: 99%
“…Find edge set containing edges starting at node C; (6) Randomly choose an edge (C, X) from ; (7) Append X to L; (8) Add X into T; (9) current node C = X; (10) return L; Algorithm 2: All-nodes-covered path identification. covered.…”
Section: Inputmentioning
confidence: 99%
“…Compared with HTML4, HTML5 defines more specific input attributes such as telephone number, color, and email address. However, on the other hand, some studies have also presented the security issues affiliated with HTML5 [1][2][3][4][5], especially the injection attacks on the websites [6][7][8][9]. Even though in HTML5 regular users can only enter a valid value through the user interfaces supported by browsers, malicious users can skip the user interface and directly send malformed HTTP requests to the web server.…”
Section: Introductionmentioning
confidence: 99%
“…Such situations have instigated an enlarged quantity of cyber-attacks on the world wide web (WWW). The most popular threat that is considered to be a plague for the modern online social network-based web application is cross-site scripting (XSS) worm [1][2][3]. Such attacks are generally crafted by injecting untrusted/malicious JavaScript code [4] on the injection points of web application.…”
Section: Introductionmentioning
confidence: 99%