Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security 2012
DOI: 10.1145/2414456.2414458
|View full text |Cite
|
Sign up to set email alerts
|

Protection, usability and improvements in reflected XSS filters

Abstract: Due to the high popularity of Cross-Site Scripting (XSS) attacks, most major browsers now include or support filters to protect against reflected XSS attacks. Internet Explorer and Google Chrome provide built-in filters, while Firefox supports extensions that provide this functionality. In this paper, we analyze the two most popular open-source XSS filters, XSSAuditor for Google Chrome and NoScript for Firefox. We point out their weaknesses, and present a new browser-resident defense called XSSFilt. In contras… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 13 publications
0
17
0
Order By: Relevance
“…Recently, numerous researchers and vendors of web browsers have designed XSS filters that are integrated as an extension on different web browsers for alleviating the XSS worms from different platforms of modern web applications. We have explored the four finest XSS filters (NoScript [14], IE 8 [15], XSSAuditor [16], and XSSFilt [17]) and identified that they are either unsatisfactorily slow or can be simply evaded.…”
Section: Existing Challenges and Performance Issues In Recent Cross-smentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, numerous researchers and vendors of web browsers have designed XSS filters that are integrated as an extension on different web browsers for alleviating the XSS worms from different platforms of modern web applications. We have explored the four finest XSS filters (NoScript [14], IE 8 [15], XSSAuditor [16], and XSSFilt [17]) and identified that they are either unsatisfactorily slow or can be simply evaded.…”
Section: Existing Challenges and Performance Issues In Recent Cross-smentioning
confidence: 99%
“…XSSFilt [17] XSSAuditor [16] NoScript [14] Internet Explorer 8 [15] noXSS [30] Sun et al Attacks utilized for evading step 1 Exploitation of various browser parsing quirks Browser parsing quirks create a problem for these filters as they try to discover scripts via statically parsing HTML. XSS-immune runs by extracting the script nodes before being transmitted towards JavaScript engine and therefore cannot undergo such problem.…”
Section: Related Workmentioning
confidence: 99%
“…NoXSS [10] adopts a longest common subsequence algorithm, which allows parts of a substring to be present in an input parameter while missing in a response. XSSFilt [11] relies on an approximate, rather than exact, string match to be able to identify taint in the presence of simple sanitization or normalization operations used by a web application. These techniques have been proven to be useful in inferring taints that may cause XSS.…”
Section: Taint Inferencementioning
confidence: 99%
“…There is one key difference that should be noted. In existing taint inference techniques, [11], [13], [14], the edit distance is used as a measure, and an object function is then used to minimize the edit distance between two sequences. The edit distance, also referred to as the Levenshtein distance, is the minimum number of edit operations (that is, insertions, deletions, and substitutions) needed to transform one sequence into another.…”
Section: Tackling Url Rewriting By Local Sequence Alignmentmentioning
confidence: 99%
“…In XSS, one of the severe cases is that the attacker could steal victim's session cookie to hijack victim's session and take over victim's account. To cope with the XSS cookie stealing problem, research work [15] [25] [33] [36] [44] has delivered promising results to counter against the cookie stealing problem. To overcome these defense techniques, cyber-criminals will have to switch to a different attack other than stealing user cookies, namely CSRF.…”
Section: Introductionmentioning
confidence: 99%