2008 Annual Computer Security Applications Conference (ACSAC) 2008
DOI: 10.1109/acsac.2008.36
|View full text |Cite
|
Sign up to set email alerts
|

XSSDS: Server-Side Detection of Cross-Site Scripting Attacks

Abstract: Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the actual exploitation is within the victim's web browser on the client-side. Therefore, an operator of a web application has only very limited evidence of XSS issues. In this paper, we propose a passive detection system to identify successful XSS attacks. Based on a prototypical implementation, we examine our approach's accuracy and ver… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(37 citation statements)
references
References 11 publications
0
37
0
Order By: Relevance
“…The types of storage intentions can furthermore be enough from the previous research. According to [19] nigh the reflected XSS detector, anent 95% of the revile applications did moan substitute every Tom false-positives at all over; the tread polemic (which is unescorted encountered in approximately 1% of the cases), lies at about 5 alarms per 100 pages. It is also shown in surface 1.…”
Section: Discussionmentioning
confidence: 99%
“…The types of storage intentions can furthermore be enough from the previous research. According to [19] nigh the reflected XSS detector, anent 95% of the revile applications did moan substitute every Tom false-positives at all over; the tread polemic (which is unescorted encountered in approximately 1% of the cases), lies at about 5 alarms per 100 pages. It is also shown in surface 1.…”
Section: Discussionmentioning
confidence: 99%
“…In XSS, attacker embeds malicious script into a website. Whenever a user browser run this code the attacker can shape the browser to do whatever it wants .XSS attacks occur whenever an application takes un-trusted data and sends it to web browser without proper validation and sanitization [5]. So in XSS attacks three parties are involved-the attacker, the client and the website.…”
Section: Cross-site Scripting Attacksmentioning
confidence: 99%
“…Johns et al has proposed a passive detection system to identify successful XSS attacks [5]. It uses two different approaches based on generic observations of XSS attacks and web applications.…”
Section: Related Workmentioning
confidence: 99%
“…XSSDS [1], XSS-GUARD [19] use Firefox components like rbNarcissus [20] to precisely identify scripts in a web page. Wassermann's [21] work is based on tainted information flow with string analysis.…”
Section: B Passive Defensementioning
confidence: 99%
“…There are three types of known XSS flaws [1]- [3]: 1)Stored XSS, 2)Reflected XSS, 3)DOM based XSS, among which Stored XSS vulnerability always allows the most powerful attacks. During this type of attack, attack vectors are submitted to web server and stored on the server (in a database, file system or other locations).…”
Section: Introductionmentioning
confidence: 99%