DSpace Repository

BDS: Browser Dependent XSS Sanitizer

Show simple item record

dc.contributor.author Gupta, Shashank
dc.date.accessioned 2024-11-11T08:44:23Z
dc.date.available 2024-11-11T08:44:23Z
dc.date.issued 2015
dc.identifier.uri https://www.igi-global.com/chapter/bds/119343
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16316
dc.description.abstract Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers. en_US
dc.language.iso en en_US
dc.publisher IGI Global en_US
dc.subject Computer Science en_US
dc.subject Web browser en_US
dc.subject Web applications en_US
dc.title BDS: Browser Dependent XSS Sanitizer en_US
dc.type Book chapter en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account