An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications
Title | An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Peguero, Ksenia, Zhang, Nan, Cheng, Xiuzhen |
Conference Name | Companion Proceedings of the The Web Conference 2018 |
Publisher | International World Wide Web Conferences Steering Committee |
Conference Location | Republic and Canton of Geneva, Switzerland |
ISBN Number | 978-1-4503-5640-4 |
Keywords | Cross Site Scripting, cross-site scripting, framework analysis, Human Behavior, javascript security, pubcrawl, resilience, Scalability, template engines, web frameworks, web security |
Abstract | \textbackslashtextbackslashtextitBackground: JavaScript frameworks are widely used to create client-side and server-side parts of contemporary web applications. Vulnerabilities like cross-site scripting introduce significant risks in web applications.\textbackslashtextbackslash\textbackslashtextbackslash \textbackslashtextbackslashtextitAim: The goal of our study is to understand how the security features of a framework impact the security of the applications written using that framework.\textbackslashtextbackslash\textbackslashtextbackslash \textbackslashtextbackslashtextitMethod: In this paper, we present four locations in an application, relative to the framework being used, where a mitigation can be applied. We perform an empirical study of JavaScript applications that use the three most common template engines: Jade/Pug, EJS, and Angular. Using automated and manual analysis of each group of applications, we identify the number of projects vulnerable to cross-site scripting, and the number of vulnerabilities in each project, based on the framework used.\textbackslashtextbackslash\textbackslashtextbackslash \textbackslashtextbackslashtextitResults: We analyze the results to compare the number of vulnerable projects to the mitigation locations used in each framework and perform statistical analysis of confounding variables.\textbackslashtextbackslash\textbackslashtextbackslash \textbackslashtextbackslashtextitConclusions: The location of the mitigation impacts the application's security posture, with mitigations placed within the framework resulting in more secure applications. |
URL | https://doi.org/10.1145/3184558.3188736 |
DOI | 10.1145/3184558.3188736 |
Citation Key | peguero_empirical_2018 |