2012
DOI: 10.48550/arxiv.1211.4812
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

XSS-FP: Browser Fingerprinting using HTML Parser Quirks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Due to the same issue, browsers often implement error tolerance where the browsers are trying to accept way more inputs than specified by a grammar or trying to repair invalid values automatically [38]. As a result, various issues such as mutationXSS [39], browser fingerprinting [2], and inconsistent security header behavior between browsers [15] arise.…”
Section: (Security)-issues Of Nonconformitymentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the same issue, browsers often implement error tolerance where the browsers are trying to accept way more inputs than specified by a grammar or trying to repair invalid values automatically [38]. As a result, various issues such as mutationXSS [39], browser fingerprinting [2], and inconsistent security header behavior between browsers [15] arise.…”
Section: (Security)-issues Of Nonconformitymentioning
confidence: 99%
“…However, this project does not support the new RFC 9110 specifications and misses many functionalities, such as HTTP/2 support. The interest in the project also appears low, and we could find, report, and fix a bug in a header ABNF check that has existed for six years 2 .…”
Section: Towards Better Http Conformancementioning
confidence: 99%