File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.cose.2011.12.004
- Scopus: eid_2-s2.0-84861099922
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Noncespaces: Using randomization to defeat cross-site scripting attacks
Title | Noncespaces: Using randomization to defeat cross-site scripting attacks |
---|---|
Authors | |
Keywords | Client-side policy enforcement Cross-site scripting Defense Information flow tracking Security Web application World wide web |
Issue Date | 2012 |
Citation | Computers and Security, 2012, v. 31, n. 4, p. 612-628 How to Cite? |
Abstract | Cross-site scripting (XSS) vulnerabilities are among the most common and serious web application vulnerabilities. It is challenging to eliminate XSS vulnerabilities because it is difficult for web applications to sanitize all user input appropriately. We present Noncespaces, a technique that enables web clients to distinguish between trusted and untrusted content to prevent exploitation of XSS vulnerabilities. Using Noncespaces, a web application randomizes the the (X)HTML tags and attributes in each document before delivering it to the client. As long as the attacker is unable to guess the random mapping, the client can distinguish between trusted content created by the web application and untrusted content provided by an attacker. To implement Noncespaces with minimal changes to web applications, we leverage a popular web application architecture to automatically apply Noncespaces to static content processed through a popular PHP template engine. We design a policy language for Noncespaces, implement a training mode to assist policy development, and conduct extensive security testing of a generated policy for two large web applications to show the effectiveness of our technique. © 2012 Elsevier Ltd. All rights reserved. |
Persistent Identifier | http://hdl.handle.net/10722/346562 |
ISSN | 2023 Impact Factor: 4.8 2023 SCImago Journal Rankings: 1.566 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Van Gundy, Matthew | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:11:44Z | - |
dc.date.available | 2024-09-17T04:11:44Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Computers and Security, 2012, v. 31, n. 4, p. 612-628 | - |
dc.identifier.issn | 0167-4048 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346562 | - |
dc.description.abstract | Cross-site scripting (XSS) vulnerabilities are among the most common and serious web application vulnerabilities. It is challenging to eliminate XSS vulnerabilities because it is difficult for web applications to sanitize all user input appropriately. We present Noncespaces, a technique that enables web clients to distinguish between trusted and untrusted content to prevent exploitation of XSS vulnerabilities. Using Noncespaces, a web application randomizes the the (X)HTML tags and attributes in each document before delivering it to the client. As long as the attacker is unable to guess the random mapping, the client can distinguish between trusted content created by the web application and untrusted content provided by an attacker. To implement Noncespaces with minimal changes to web applications, we leverage a popular web application architecture to automatically apply Noncespaces to static content processed through a popular PHP template engine. We design a policy language for Noncespaces, implement a training mode to assist policy development, and conduct extensive security testing of a generated policy for two large web applications to show the effectiveness of our technique. © 2012 Elsevier Ltd. All rights reserved. | - |
dc.language | eng | - |
dc.relation.ispartof | Computers and Security | - |
dc.subject | Client-side policy enforcement | - |
dc.subject | Cross-site scripting | - |
dc.subject | Defense | - |
dc.subject | Information flow tracking | - |
dc.subject | Security | - |
dc.subject | Web application | - |
dc.subject | World wide web | - |
dc.title | Noncespaces: Using randomization to defeat cross-site scripting attacks | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.cose.2011.12.004 | - |
dc.identifier.scopus | eid_2-s2.0-84861099922 | - |
dc.identifier.volume | 31 | - |
dc.identifier.issue | 4 | - |
dc.identifier.spage | 612 | - |
dc.identifier.epage | 628 | - |