Loading...
Please wait, while we are loading the content...
Similar Documents
An execution-flow based method for detecting Cross-site Scripting attacks
| Content Provider | Semantic Scholar |
|---|---|
| Author | Zhang, Qianjie Chen, Hao Sun, Jianhua |
| Copyright Year | 2010 |
| Abstract | We present an execution-flow analysis for JavaScript programs running in a web browser to prevent Cross-site Scripting (XSS) attacks. We construct finite-state automata (FSA) to model the client-side behavior of Ajax applications under normal execution. Our system is deployed in proxy mode. The proxy analyzes the execution flow of client-side JavaScript before the requested web pages arrive at the browser to prevent potentially malicious scripts, which do not conform to the FSA. We evaluate our technique against several real-world applications and the result shows that it protects against a variety of XSS attacks and has an acceptable performance overhead. |
| Starting Page | 160 |
| Ending Page | 165 |
| Page Count | 6 |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://www.aimlab.org/haochen/papers/sedm10-xss.pdf |
| Journal | The 2nd International Conference on Software Engineering and Data Mining |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |