Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts
|
|
|
- Maximilian Townsend
- 10 years ago
- Views:
Transcription
1 Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts Suman Saha 1, Shizhen Jin 2,3 and Kyung-Goo Doh 3 1 LIP6-Regal, France [email protected] 2 GTOne, Seoul, Korea [email protected] 3 Hanyang University ERICA, Ansan, Korea [email protected] Abstract. A malicious hacker may inject untrustworthy payload in a dynamically generated page intentionally. If a web server does not adequately sanitize the input data, the inadvertent execution of client-side scripts injected by malicious users creates security problems. DOM-based Cross-site Scripting (XSS) is a type of XSS that creates such types of security problems in client side. This paper presents a static taint analysis for detecting DOM-based XSS holes from dynamically generated error pages, which directly addresses the absence of built-in filter function. We provide a measurement study that sheds light on the DOM-based XSS holes present in web applications and reveals the severity of this type of XSS in the web world. To the best of our knowledge, there is no directly related work on analyzing HTML pages for detecting DOM-based XSS holes and measuring study of the holes from huge number of web applications. Key words: software security, DOM-based cross-site scripting, static analysis, web application security, scripts 1 Introduction Improper validation on user input before returning to the client s web browser is one of the main reasons of Cross-Site Scripting (XSS) vulnerabilities. A malicious programmer may inject untrustworthy payload in a dynamically generated page intentionally. If a web server does not adequately sanitize the input data, the inadvertent execution of client-side scripts injected by malicious users creates security problems, letting an attacker easily circumventing the same-origin policy [1]. Corresponding author. This work was supported by the Engineering Research Center of Excellence Program of Korea Ministry of Education, Science and Technology (MEST) / National Research Foundation of Korea (NRF) (Grant ), and (Grant ) Business for Cooperative R&D between Industry, Academy, and Research Institute funded by Korea Small and Medium Business Administration in
2 2 Suman Saha, Shizhen Jin and Kyung-Goo Doh DOM-based Cross-Site Scripting(XSS) [2] is an XSS vulnerability existing within client-side pages. For instance, if any URL request parameter is accessed to write its information in the HTML body or perform any DOM-based operation without validating, a DOM-based XSS hole will likely be present, since this written data will be re-interpreted by browsers as an HTML document that could include additional client-side scripts. Instead of sending data to server, this XSS might modify DOM environment in the client side to exploit. Hence, the server stays out of scope to handle this sort of cross-site scripting. As a consequence, validation on user input in the server side cannot stop DOM-based XSS exploiting. To handle DOM-based XSS, we need to concentrate on clientside HTML pages rather than server-side pages. Say that the content of is as follows: <html> <title>welcome!</title> <body> Your name is: <script> var pos = document.url.indexof(name=)+5; var name = document.url.substring(pos, document.url.length); document.write(name); </script> </body> </html> The user input is not sanitized and later used to write in the HTML body. The script embedded in the page works alright when the user input is an expected string, i.e., an identifier, as follows: However, if the user injects any malicious script code as follows: name=<script>alert(document.cookie)</script> the script code is executed at the client side, which is obviously not the developer s intention. The string beyond # sign is a fragment, i.e., not part of an actual query, that is not sent to server. Therefore, the server will get only a query string without the malicious part of the input data. As a result, many strong XSS filters at server-side do not even recognize such attacks. Since most of detectors and firewalls ignore client-side pages, they are inherently not able to detect DOM-based XSS. In this paper, we present the method of detecting DOM-based XSS holes from HTML pages, which directly addresses the absence of applying sanitization functions to user input. The detection method proposed in this paper first induces the server to generate pages by sending dynamic requests, then extracts
3 Detection of DOM-based Cross-Site Scripting 3 script codes from the pages, and then performs taint analysis to decide whether or not the user input is sanitized before it reaches the critical hot spot. We provide a measurement study that sheds light on the DOM-based XSS holes present in the web applications and reveals the severity of this type of XSS in the web world. To the best of our knowledge, there is no directly related work on analyzing HTML pages for detecting DOM-based XSS holes and measuring study of the holes from huge number of web applications. The rest of this paper is structured as follows. Section 2 presents how to detect DOM-based XSS. Finally, Section 6 concludes. The full version of this paper will include the experiment evaluation of the proposed system and related works. 2 Methodology The presented work is targeted at the static detection of taint-style vulnerabilities. Tainted data are originated from possibly malicious user s inputs (called sources), and may cause security problems at some sensitive points in a program (called sinks). Applying a set of suitable filtering operations, tainted data can be untainted (sanitized), removing its harmful properties before reaching sinks. The goal of our analysis is to determine whether or not tainted data reaches sensitive sinks (any write method or any DOM-based operation) without proper sanitization. For this, we apply the technique of data-flow analysis, which is a well-understood topic in computer science and has been used in compiler optimizations for decades [3 5]. The URL parameter that is the major source of DOM-based XSS vulnerabilities comes from document.location, document.url, or document.referrer. The document object represents the entire HTML document and can be used to access all elements in a page. location, URL, and referrer are sub-objects of the document object. The document object is a part of the window object and is accessed through the window.document property. In the code below, document.location.href acquires the current location of URL, and then document.write method writes that URL information in the HTML body. document.write(you are using IE and visiting site + document.location.href +.) Moreover, reference to DOM objects that may be influenced by the user (attacker) should also be inspected [2], including (but not limited to): 1. document.urluuencoded 2. document.location (and many of its properties) 3. window.location (and many of its properties) These are sources for URL information. Note that a document object or a window object property may be referenced syntactically in many ways explicitly through window.location or implicitly through location. Special concentration should
4 4 Suman Saha, Shizhen Jin and Kyung-Goo Doh be given to patterns wherein the DOM is modified, either explicitly or potentially, either via raw access to the HTML or via access to the DOM itself. Amit Klein gave in his report a list that should be considered when developing tool for detecting DOM-based cross-site scripting [2]. To write in HTML body, a developer may use any of followings that are the sinks for URL information: document.write() document.writeln() document.body.innerhtml = The proposed DOM-based XSS detector first parses a JavaScript embedded HTML input file with respect to the combined grammar of HTML and JavaScript, and constructs its abstract syntax tree (AST). The JavaScript portion of the AST is then transformed into a linearized form resembling threeaddress code [5], and kept as a control flow graph. Then the detector analyzes data from source (location, URL, referrer) to sink (any write method or DOM-based operations). It observes whether or not the URL information is sanitized before reaching sink. Finally, it gives a message whether or not the given HTML page is vulnerable. The DOM-based XSS detector does taint analysis that looks for only built-in specified filter function (e.g., urlencode [16]) while it does data flow analysis from source to sink. In this phase, the detector at first locates sources, i.e., URL parameters, and then follows the program s data-flow from each source to sinks to check if the value of the source is sanitized by specified built-in filter function before reaching sinks. 3 Conclusion Cross-Site Scripting is one of the most rising vulnerabilities found in modern Web application. We provide a detection method and a first measurement study on DOM-based XSS holes. Specific security systems (such as firewalls, software proxies, etc.) that are external to the application may be unsatisfactory for several reasons. Rather, a web application should be intrinsically secure, by adapting secure programming practices, in order to preserve its invulnerability. DOM-based XSS is the result of insecure practice of JavaScript engineering. This paper suggests analyzing client-side HTML pages along with server pages to detect whole range of XSS attack. In the future, we are planning to employ the semantics of filtering function with static-taint analysis to detect DOM-based XSS in HTML files. References 1. JavaScript Security: Same Origin. Mozilla Foundation (2006) 2. Klein, A.: DOM-based Cross-Site Scripting of the Third Kind (2005)
5 Detection of DOM-based Cross-Site Scripting 5 3. Aho, A. V., Sethi, R., Ullman, J. D.: Compiler: Principles, Techniques, and Tools. Addison-Wesley Longman Publishing Co. Inc., Boston, MA, USA (1986) 4. Muchnick, S. S.: Advance Compiler Design and Implementation. Morgan Kaufmann (1997) 5. Nielson, F., Nielson, H. R., Hankin, C.: Principles of Program Analysis. Springer- Verlag New York (1999) 6. Xie, Y., Aiken, A.: Static Detection of Security Vulnerabilities in Scripting Languages. In: 15th USENIX Security Symposium, pp (2006) 7. Huang, Y.-W., Hang, F., Yu, C., Tsai, C. H., Lee, D., Kuo, S.Y.: Securing Web Application Code by Static Analysis and Runtime Protection. In: 13th International Conference on the World Wide Web (2004) 8. Livshits, V.B., Lam, M.S.: Finding Security Errors in Java Programs with Static Analysis. In: 14th USENIX Security Symposium, pp (2005) 9. Jovanovic, N., Kruegel, C., Kirda, E.: Precise Alias Analysis for Syntactic Detection of Web Application Vulnerabilities. In: ACM SIGPLAN Workshop on Programming Language and Analysis for Security (2006) 10. Yue, C., Wang, H.: Charactering Insecure JavaScript Practice on the Web. In: 18th International Conference on the World Wide Web, ACM Press (2005) 11. Moshchuk, A., Bragin, T., Gribble, S. D., Levy, H. M.: A Crawler-based Study of Spyware in the Web. In: 13th Annual Network and Distributed System Security Symposium (2006) 12. Provos, N., Mavrommatis, P., Rajab, M. A., Monrose, F.: All Your iframe Point to Us. In: 17th USENIX Security Symposium (2008). 13. Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S. T.: Automated Web Portal with Strider Honeymonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. In: 13th Annual Network and Distributed System Security Symposium (2006). 14. Joo, B.-G., Min, B.-W., Chang, M.-S., Ahn, C.-K., Yang, D.-H.: Development of Vulnerability Scanner using Search Engine. The Journal of IWIT (The Institute of Webcasting, Internet and Telecommunication). Vol.9, No.1, pp (2009)
Securing PHP Based Web Application Using Vulnerability Injection
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing
Reliable Mitigation of DOM-based XSS
Intro XSS Implementation Evaluation Q&A Reliable Mitigation of DOM-based XSS Tobias Mueller 2014-09-07 1 / 39 Intro XSS Implementation Evaluation Q&A About me The results Motivation about:me MSc. cand.
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
International Journal of Security and Its s Applications Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis YoungHan Choi, TaeGhyoon Kim, SeokJin Choi The
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
Securing Network Software using Static Analysis
Securing Network Software using Static Analysis Lauri Kolmonen Helsinki University of Technology [email protected] Abstract Writing network software is not easy and developing secure network software
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS
SQL INJECTION MONITORING SECURITY VULNERABILITIES IN WEB APPLICATIONS Manas Kumar 1, S. Senthil kumar 2 and D. Sarvanan 3 1 M.C.A. (Final Year) Abstract Sql injection: a recently discovered application
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
A Survey on Detection and Prevention of Cross-Site Scripting Attack
, pp. 139-152 http://dx.doi.org/10.14257/ijsia.2015.9.3.14 A Survey on Detection and Prevention of Cross-Site Scripting Attack V. Nithya 1, S. Lakshmana Pandian 2 and C. Malarvizhi 3 1,3 University College
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT K. G. Maheswari 1 and R. Anita 2 1 Department of MCA, Institute of Road and Transport Technology, Anna University, Erode, Tamil Nadu,
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
25 Million Flows Later - Large-scale Detection of DOM-based XSS
25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies SAP AG [email protected] Ben Stock FAU Erlangen-Nuremberg [email protected] Martin Johns SAP AG [email protected]
Analysis of Browser Defenses against XSS Attack Vectors
Analysis of Browser Defenses against XSS Attack Vectors Shital Dhamal Department of Computer Engineering Lokmanya Tilak College of Engineering Koparkhairne,Navi Mumbai,Maharashtra,India Manisha Mathur
Study of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their Countermeasures Gurvinder Kaur University Institute of Engineering and Technology Kurukshetra University India Abstract: - In present-day time, most of the
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Technical Report)
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Technical Report) Nenad Jovanovic, Christopher Kruegel, Engin Kirda Secure Systems Lab Vienna University of Technology Abstract
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks Prithvi Bisht (http://cs.uic.edu/~pbisht) Joint work with : V.N. Venkatakrishnan Systems and Internet Security Laboratory Department
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense Shashank Gupta Lecturer in Department of Information Technology, Model Institute of Engineering and
An Effective Approach for Detecting and Preventing Sqlinjection Attacks
An Effective Approach for Detecting and Preventing Sqlinjection Attacks M. Roslinmary 1, S. Sivasakthi 2, A. Shenbaga Bharatha Priya 3 1, 2, 3 PG scholar, Department of IT, Dr. Sivanthi Aditanar College
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna Secure Systems Lab Technical
Finding Execution Faults in Dynamic Web Application
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications
A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications Joaquin Garcia-Alfaro 1 and Guillermo Navarro-Arribas 2 1 Universitat Oberta de Catalunya, Rambla Poble
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna Secure Systems Lab Technical
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
Protection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
JavaScript static security analysis made easy with JSPrime
JavaScript static security analysis made easy with JSPrime Nishant Das Patnaik & Sarathi Sabyasachi Sahoo [email protected] & [email protected] JavaScript is the lingua-franca of Web 2.0 and, recently,
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS 1 FAKHRELDEEN ABBAS SAEED, 2 ELTYEB E. ABED ELGABAR 1,2 Asstt Prof., Department of Information Technology, College of Computer Science and Information
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
An analysis on Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries Jaskanwal Minhas Dept. of Computer Science and Engineering, Sant Baba Bhag Singh Institute of Engineering and Technology,
End-to-end Web Application Security
End-to-end Web Application Security Úlfar Erlingsson Benjamin Livshits Microsoft Research Yinglian Xie Abstract Web applications are important, ubiquitous distributed systems whose current security relies
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
WEB APPLICATION VULNERABILITY DETECTION USING DYNAMIC ANALYSIS WITH PENETERATION TESTING
WEB APPLICATION VULNERABILITY DETECTION USING DYNAMIC ANALYSIS WITH PENETERATION TESTING Sreenivasa Rao B 1 Dept. of Computer Science & Engineering CMJ University, Shillong, India Kumar N 2 Dept. of Computer
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
An Automated Vulnerability Scanner for Injection Attack Based on Injection Point
An Automated Vulnerability Scanner for Injection Attack Based on Injection Point Jan-Min Chen The Dept. of Information Management Yu Da University Miaoli, Taiwan E-Mail: [email protected] Chia-Lun Wu
Detection and Prevention of SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks 1 Sailor Pratik, 2 Prof. Jaydeep Gheewala 1 Computer Department 1 Sarvajanik College of Engineering and Technology, Surat, Gujarat, India 1 [email protected],
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Prevention of Cross-Site Scripting Attacks on Current Web Applications Joaquin Garcia-Alfaro 1 and Guillermo Navarro-Arribas 2 1 Universitat Oberta de Catalunya, Rambla Poble Nou 156, 08018 Barcelona -
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia
Security Model for the Client-Side Web Application Environments
Security Model for the Client-Side Web Application Environments May 24, 2007 Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, and Frederik De Keukelaere IBM Tokyo Research
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on
Precise client-side protection against DOM-based Cross-Site Scripting
Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg [email protected] Patrick Spiegel SAP AG [email protected] Sebastian Lekies SAP AG [email protected]
Static analysis for detecting taint-style vulnerabilities in web applications
Journal of Computer Security 18 (2010) 861 907 861 DOI 10.3233/JCS-2009-0385 IOS Press Static analysis for detecting taint-style vulnerabilities in web applications Nenad Jovanovic a, Christopher Kruegel
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
A Survey on Server-side Approaches to Securing Web Applications
A Survey on Server-side Approaches to Securing Web Applications XIAOWEI LI Vanderbilt University YUAN XUE Vanderbilt University Web applications are one of the most prevalent platforms for information
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.
Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Client-Side Cross-Site Scripting Protection
Client-Side Cross-Site Scripting Protection Engin Kirda, Nenad Jovanovic, Christopher Kruegel, and Giovanni Vigna Institute Eurecom [email protected] Secure Systems Lab Technical University Vienna [email protected]
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS Vandana Dwivedi 1, Himanshu Yadav 2 and Anurag Jain 3 1 Department of Computer Science & Engineering, RITS,Bhopal (India) 2 Department
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni
Complete Cross-site Scripting Walkthrough
Complete Cross-site Scripting Walkthrough Author : Ahmed Elhady Mohamed Email : [email protected] website: www.infosec4all.tk blog : www.1nfosec4all.blogspot.com/ [+] Introduction wikipedia
Security of Web Applications and Browsers: Challenges and Solutions
Security of Web Applications and Browsers: Challenges and Solutions A Tutorial Proposal for ACM SAC 2015 By Dr. Hossain Shahriar Department of Computer Science Kennesaw State University Kennesaw, GA 30144,
Are AJAX Applications Vulnerable to Hack Attacks?
Are AJAX Applications Vulnerable to Hack Attacks? The importance of Securing AJAX Web Applications This paper reviews AJAX technologies with specific reference to JavaScript and briefly documents the kinds
A tale of the weaknesses of current client-side XSS filtering
A tale of the weaknesses of current client-side XSS filtering Sebastian Lekies SAP AG [email protected] @sebastianlekies Martin Johns SAP AG [email protected] @datenkeller Ben Stock FAU Erlangen-Nuremberg
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Prevent Cross-site Request Forgery: PCRF
Prevent Cross-site Request Forgery: PCRF Sooel Son University of Texas, Austin [email protected] Abstract CSRF attacks are one of the most prevalent and dangerous web threats at the level of XSS, SQL
RIPS - A static source code analyser for vulnerabilities in PHP scripts
RIPS - A static source code analyser for vulnerabilities in PHP scripts Johannes Dahse 1 Introduction The amount of websites have increased rapidly during the last years. While websites consisted mostly
Hunting Cross-Site Scripting Attacks in the Network
Hunting Cross-Site Scripting Attacks in the Network Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos Institute of Computer Science Foundation for Research and Technology - Hellas N.
VULNERABILITY MANAGEMENT IN WEB APPLICATION
VULNERABILITY MANAGEMENT IN WEB APPLICATION Prof. Amit R. Wasukar 1, Mohammad Usman 2 and Neha Sakhare 3 Assistant Professor, C.S.E. Department, J.D.I.E.T. Yavatmal, [email protected] Final Year Student,
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
Network Security Web Security
Network Security Web Security Anna Sperotto, Ramin Sadre Design and Analysis of Communication Systems Group University of Twente, 2012 Cross Site Scripting Cross Side Scripting (XSS) XSS is a case of (HTML)
RIPS - A static source code analyser for vulnerabilities in PHP scripts
RIPS - A static source code analyser for vulnerabilities in PHP scripts Johannes Dahse Seminar Work at Chair for Network and Data Security Prof. Dr. Jörg Schwenk advised through Dominik Birk 23.08.2010
Precise Alias Analysis for Static Detection of Web Application Vulnerabilities
Precise Alias Analysis for Static Detection of Web Application Vulnerabilities Nenad Jovanovic Christopher Kruegel Engin Kirda Secure Systems Lab Technical University of Vienna {enji,chris,ek}@seclab.tuwien.ac.at
The Power of Obfuscation Techniques in Malicious JavaScript Code: A Measurement Study
The Power of Obfuscation Techniques in Malicious JavaScript Code: A Measurement Study Wei Xu, Fangfang Zhang and Sencun Zhu Department of Computer Science and Engineering The Pennsylvania State University,
Peering Through the iframe
Peering Through the iframe Brett Stone-Gross, Marco Cova, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara University of Birmingham, United Kingdom {bstone,chris,vigna}@cs.ucsb.edu
Securing Server/Client side Applications against XSS attack via XSS-Obliterator
Securing Server/Client side Applications against XSS attack via XSS-Obliterator Amit Singh #1, Suraj Singh Tomer *2 Mtech Computer Science Engineering, RGPV Airport Bypass Road, Gandhi Nagar, Bhopal, Madhya
Web Application Security
Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario M. Durai Ganesh (Research Scholars) Information Technology, St. Peter s University, Chennai- 54, Tamil Nadu, India Dr. G.Gunasekaran,
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Network Security Testing using MMT: A case study in IDOLE project
Network Security Testing using MMT: A case study in IDOLE project Vinh Hoa LA PhD Student Prof. Ana CAVALLI Supevisor Telecom SudParis Institut Mines Telecom France IDOLE project IDOLE: 3-year French project
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Robust Defence against XSS through Context Free Grammar
Robust Defence against XSS through Context Free Grammar 1 Divya Rishi Sahu, 2 Deepak Singh Tomar 1,2 Dept. of CSE, MANIT, Bhopal, MP, India Abstract JavaScript is one of the world s most widely adopted
Exploiting Web 2.0 Next Generation Vulnerabilities
Exploiting Web 2.0 Next Generation Vulnerabilities OWASP EU09 Poland Shreeraj Shah Chapter Lead Founder & Director Blueinfy Solutions [email protected] Copyright The OWASP Foundation Permission is
Web Application Exploits
Monday, November 10, 2014 Resources: see final slide CS342 Computer Security Department of Computer Science Wellesley College Web Evolution o Static content: Server serves web pages created by people.
