Please use this identifier to cite or link to this item:
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16316
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gupta, Shashank | - |
dc.date.accessioned | 2024-11-11T08:44:23Z | - |
dc.date.available | 2024-11-11T08:44:23Z | - |
dc.date.issued | 2015 | - |
dc.identifier.uri | https://www.igi-global.com/chapter/bds/119343 | - |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16316 | - |
dc.description.abstract | Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IGI Global | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Web browser | en_US |
dc.subject | Web applications | en_US |
dc.title | BDS: Browser Dependent XSS Sanitizer | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Department of Computer Science and Information Systems |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.