Visible to the public Enhanced browser defense for reflected Cross-Site Scripting

TitleEnhanced browser defense for reflected Cross-Site Scripting
Publication TypeConference Paper
Year of Publication2014
AuthorsMewara, B., Bairwa, S., Gajrani, J., Jain, V.
Conference NameReliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on
Date PublishedOct
Keywordsattack vectors, Browsers, client-side solution, defense, enhanced browser defense, filter, HTML, Information filters, malicious input, malicious script, online front-ends, open source Mozilla Firefox security extension, reflected cross-site scripting, reflected XSS vulnerability, search engines, security, security of data, sensitive information, sophisticated attack, special characters, Testing, unfiltered reflection, Vectors, vulnerable Web application, Web browser, Web page, Web sites, XSS, XSS attack, XSS-Me
Abstract

Cross-Site Scripting (XSS) is a common attack technique that lets attackers insert the code in the output application of web page which is referred to the web browser of visitor and then the inserted code executes automatically and steals the sensitive information. In order to prevent the users from XSS attack, many client- side solutions have been implemented; most of them being used are the filters that sanitize the malicious input. However, many of these filters do not provide prevention to the newly designed sophisticated attacks such as multiple points of injection, injection into script etc. This paper proposes and implements an approach based on encoding unfiltered reflections for detecting vulnerable web applications which can be exploited using above mentioned sophisticated attacks. Results prove that the proposed approach provides accurate higher detection rate of exploits. In addition to this, an implementation of blocking the execution of malicious scripts have contributed to XSS-Me: an open source Mozilla Firefox security extension that detects for reflected XSS vulnerabilities which can be considered as an effective solution if it is integrated inside the browser rather than being enforced as an extension.

DOI10.1109/ICRITO.2014.7014761
Citation Key7014761