Browser's defenses against reflected cross-site scripting attacks
Title | Browser's defenses against reflected cross-site scripting attacks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Mewara, B., Bairwa, S., Gajrani, J. |
Conference Name | Signal Propagation and Computer Technology (ICSPCT), 2014 International Conference on |
Date Published | July |
Keywords | attacker, Browsers, bypass, exploit, filter, Google Chrome 32, Internet Explorer 11, JavaScript, Mozilla Firefox 27, online front-ends, online Web applications, reflected cross-site scripting attacks, Reflected XSS, security, security of data, Thyristors, Web based attack, Web browsers, XSS attack, XSS filters, XSS-Me |
Abstract | Due to the frequent usage of online web applications for various day-to-day activities, web applications are becoming most suitable target for attackers. Cross-Site Scripting also known as XSS attack, one of the most prominent defacing web based attack which can lead to compromise of whole browser rather than just the actual web application, from which attack has originated. Securing web applications using server side solutions is not profitable as developers are not necessarily security aware. Therefore, browser vendors have tried to evolve client side filters to defend against these attacks. This paper shows that even the foremost prevailing XSS filters deployed by latest versions of most widely used web browsers do not provide appropriate defense. We evaluate three browsers - Internet Explorer 11, Google Chrome 32, and Mozilla Firefox 27 for reflected XSS attack against different type of vulnerabilities. We find that none of above is completely able to defend against all possible type of reflected XSS vulnerabilities. Further, we evaluate Firefox after installing an add-on named XSS-Me, which is widely used for testing the reflected XSS vulnerabilities. Experimental results show that this client side solution can shield against greater percentage of vulnerabilities than other browsers. It is witnessed to be more propitious if this add-on is integrated inside the browser instead being enforced as an extension. |
DOI | 10.1109/ICSPCT.2014.6884928 |
Citation Key | 6884928 |