DSpace Repository

XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications

Show simple item record

dc.contributor.author Gupta, Shashank
dc.date.accessioned 2024-11-05T11:59:24Z
dc.date.available 2024-11-05T11:59:24Z
dc.date.issued 2016-08
dc.identifier.uri https://onlinelibrary.wiley.com/doi/full/10.1002/sec.1579
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16302
dc.description.abstract In this paper, the authors analyzed and discussed the performance issues in the existing cross-site scripting (XSS) filters and based on that, proposed a JavaScript string comparison and context-aware sanitization-based framework, XSS-immune. It is a browser-resident framework that compares the set of scripts embedded in hypertext transfer protocol request (HREQ) and hypertext transfer protocol response (HRES) for discovering any similar untrusted/malicious JavaScript code. This similar code points towards the untrusted JavaScript code that will be utilized by an attacker to exploit the vulnerabilities of XSS worms. In addition, our technique determines the context of such worms and performs the sanitization on them accordingly for alleviating the effect of such XSS worms from the real world web applications. We have also introduced a mechanism that can detect the injection of malicious parameter values by modifying the existing JavaScript code, that is, partial script injections. The prototype of XSS-immune was developed in Java and installed as an extension on the Google Chrome. In addition, we have verified the implementation of our design of prototype against five open-source XSS attack vector repositories, and very few XSS attack worms were able to evade our proposed design. Experimental evaluation and testing of XSS-immune were performed by adding support from the tested suite of real world web applications. The performance evaluation results revealed that our framework is able to detect the XSS worms with acceptable low false positive and false negative rate in comparison with the performance of existing XSS filters. Experimental results also incurred acceptable runtime overhead because of minor alterations on client-side browser and computationally fast execution of modules deployed in our browser-resident framework. en_US
dc.language.iso en en_US
dc.publisher Wiley en_US
dc.subject Computer Science en_US
dc.subject XSS-immune en_US
dc.subject Google chrome en_US
dc.subject Web applications en_US
dc.title XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account