Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing
Title | Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Abgrall, E., le Traon, Y., Gombault, S., Monperrus, M. |
Conference Name | Software Testing, Verification and Validation Workshops (ICSTW), 2014 IEEE Seventh International Conference on |
Date Published | March |
Keywords | browser, Browsers, cross-site scripting, HTML, Mobile communication, online front-ends, Payloads, regression, regression analysis, security, security of data, systematic security regression testing, Testing, Vectors, web, Web applications, Web browser attack surface, XSS, XSS vector testing |
Abstract | One of the major threats against web applications is Cross-Site Scripting (XSS). The final target of XSS attacks is the client running a particular web browser. During this last decade, several competing web browsers (IE, Netscape, Chrome, Firefox) have evolved to support new features. In this paper, we explore whether the evolution of web browsers is done using systematic security regression testing. Beginning with an analysis of their current exposure degree to XSS, we extend the empirical study to a decade of most popular web browser versions. We use XSS attack vectors as unit test cases and we propose a new method supported by a tool to address this XSS vector testing issue. The analysis on a decade releases of most popular web browsers including mobile ones shows an urgent need of XSS regression testing. We advocate the use of a shared security testing benchmark as a good practice and propose a first set of publicly available XSS vectors as a basis to ensure that security is not sacrificed when a new version is delivered. |
DOI | 10.1109/ICSTW.2014.63 |
Citation Key | 6825636 |