Prevention of Cross-Site Scripting Attacks on Current Web Applications ∗
Saved in:
| Title: | Prevention of Cross-Site Scripting Attacks on Current Web Applications ∗ |
|---|---|
| Authors: | Joaquin Garcia-alfaro, Guillermo Navarro-arribas |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://www.scs.carleton.ca/~joaquin/papers/is07.pdf. |
| Publication Year: | 2007 |
| Collection: | CiteSeerX |
| Subject Terms: | Software Protection, Code Injection Attacks, Security Policies |
| Description: | Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organizations. Web applications must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on the specific problem of preventing cross-site scripting attacks against web applications. We present a study of this kind of attacks, and survey current approaches for their prevention. The advantages and limitations of each proposal are discussed, and an alternative solution is introduced. Our proposition is based on the use of X.509 certificates, and XACML for the expression of authorization policies. By using our solution, developers and/or administrators of a given web application can specifically express its security requirements from the server side, and require the proper enforcement of such requirements on a compliant client. This strategy is seamlessly integrated in generic web applications by relaying in the SSL and secure redirect calls. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7753; http://www.scs.carleton.ca/~joaquin/papers/is07.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7753 http://www.scs.carleton.ca/~joaquin/papers/is07.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.E71264FA |
| Database: | BASE |
| Abstract: | Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organizations. Web applications must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on the specific problem of preventing cross-site scripting attacks against web applications. We present a study of this kind of attacks, and survey current approaches for their prevention. The advantages and limitations of each proposal are discussed, and an alternative solution is introduced. Our proposition is based on the use of X.509 certificates, and XACML for the expression of authorization policies. By using our solution, developers and/or administrators of a given web application can specifically express its security requirements from the server side, and require the proper enforcement of such requirements on a compliant client. This strategy is seamlessly integrated in generic web applications by relaying in the SSL and secure redirect calls. |
|---|
Nájsť tento článok vo Web of Science