2020
DOI: 10.1007/978-981-15-5029-4_7
|View full text |Cite
|
Sign up to set email alerts
|

A Three-Pronged Approach to Mitigate Web Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…However, IE users should exercise caution when interacting with these images because some IE features allow for cross-site scripting attacks using images. Whereas many famous, popular websites have managed to protect their visitors from potential JavaScript attacks, such as implementing filters specifically designed to protect against active content, they are unable to extract active content [55,56].…”
Section: Mime Sniffingmentioning
confidence: 99%
“…However, IE users should exercise caution when interacting with these images because some IE features allow for cross-site scripting attacks using images. Whereas many famous, popular websites have managed to protect their visitors from potential JavaScript attacks, such as implementing filters specifically designed to protect against active content, they are unable to extract active content [55,56].…”
Section: Mime Sniffingmentioning
confidence: 99%
“…The existing software for detecting XSS vulnerabilities, such as the Online Web Security Scanner, search for these vulnerabilities only in the open parts of websites that do not require access authorisation [17][18][19][20][21]. Such a drawback is significant considering that XSS vulnerabilities may be located in an unsearchable part of a web resource.…”
Section: Xss Vulnerabilities Detection Softwarementioning
confidence: 99%