CSRF protection in JavaScript frameworks and the security of JavaScript applications

With JavaScript being the most popular programming language on the web, several new JavaScript frameworks are released every year. A well designed framework may help developers create secure applications. The goal of our study is to understand how framework developers can best protect applications d...

Full description

Saved in:
Bibliographic Details
Published in:High-Confidence Computing Vol. 1; no. 2; p. 100035
Main Authors: Peguero, Ksenia, Cheng, Xiuzhen
Format: Journal Article
Language:English
Published: Elsevier B.V 01.12.2021
Elsevier
Subjects:
ISSN:2667-2952, 2667-2952
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With JavaScript being the most popular programming language on the web, several new JavaScript frameworks are released every year. A well designed framework may help developers create secure applications. The goal of our study is to understand how framework developers can best protect applications developed using their framework. In this work we studied how cross-site request forgery vulnerability is mitigated in several server-side JavaScript frameworks: Express.js, Koa.js, Hapi.js, Sails.js, and Meteor.js. We then analyzed open source applications developed with these frameworks using open source and custom written tools for automated static analysis and identified the percentage of protected applications for each framework. We correlated our analysis results to the implementation levels of mitigating controls in each framework and performed statistical analysis of our results to ensure no other confounding factors were involved. Based on the received outcomes we provide recommendations for framework developers on how to create frameworks that produce secure applications.
ISSN:2667-2952
2667-2952
DOI:10.1016/j.hcc.2021.100035