Visible to the public Two for the price of one: A combined browser defense against XSS and clickjacking

TitleTwo for the price of one: A combined browser defense against XSS and clickjacking
Publication TypeConference Paper
Year of Publication2016
AuthorsRao, K. S., Jain, N., Limaje, N., Gupta, A., Jain, M., Menezes, B.
Conference Name2016 International Conference on Computing, Networking and Communications (ICNC)
Keywordsattack vector, attribute injection, browser, browser defense, Browsers, clickjacking, client-side defence, composability, Context, Cross Site Scripting, Engines, HTML, HTML injection, HTTP request parameter, Human Behavior, Information filters, Internet, Java, JavaScript, Mozilla Firefox browser, online front-ends, partial script injection, pubcrawl, Resiliency, security of data, Web application threat, Web pages, web security, XBuster, XSS attack vector
AbstractCross Site Scripting (XSS) and clickjacking have been ranked among the top web application threats in recent times. This paper introduces XBuster - our client-side defence against XSS, implemented as an extension to the Mozilla Firefox browser. XBuster splits each HTTP request parameter into HTML and JavaScript contexts and stores them separately. It searches for both contexts in the HTTP response and handles each context type differently. It defends against all XSS attack vectors including partial script injection, attribute injection and HTML injection. Also, existing XSS filters may inadvertently disable frame busting code used in web pages as a defence against clickjacking. However, XBuster has been designed to detect and neutralize such attempts.
DOI10.1109/ICCNC.2016.7440629
Citation Keyrao_two_2016