2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops 2014
DOI: 10.1109/icstw.2014.63
|View full text |Cite
|
Sign up to set email alerts
|

Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing

Abstract: Abstract-One of the major threats against web applications is Cross-Site Scripting (XSS). The final target of XSS attacks is the client running a particular web browser. During this last decade, several competing web browsers (IE, Netscape, Chrome, Firefox) have evolved to support new features. In this paper, we explore whether the evolution of web browsers is done using systematic security regression testing. Beginning with an analysis of their current exposure degree to XSS, we extend the empirical study to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…However, these techniques need further validation and research. Abgral et al utilized cross-site scripting attacks [32] to fingerprint HTML parsers in different browsers. This method yields fingerprints that are hard to mislead and difficult to reproduce since they presume a running HTML parser.…”
Section: Overview Of Browser Fingerprint Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…However, these techniques need further validation and research. Abgral et al utilized cross-site scripting attacks [32] to fingerprint HTML parsers in different browsers. This method yields fingerprints that are hard to mislead and difficult to reproduce since they presume a running HTML parser.…”
Section: Overview Of Browser Fingerprint Researchmentioning
confidence: 99%
“…Another approach was proposed in [45], where Chromium was changed to protect against Flash and Canvas browser fingerprinting, but without influencing the two technologies. Laperdrix et al [46] also offered a Firefox-based upgrade with fingerprint protection against AudioContext, and Mitropoulos et al presented a training technique [47] for known cross-site scripting attacks to gather browser fingerprints [32]. ElBanna and Abdelbaki later created a method to reduce browser fingerprinting [48] for WebGL and Canvas fingerprint monitoring.…”
Section: Overview Of Browser Fingerprint Defense Researchmentioning
confidence: 99%
“…Using model extraction methods, people mainly study the implementations security such as F * [15], [20], C [9], JAVA [34], [35], Swift [36], and ProScript [37]. Bhargavan et al [20] proposed a model extraction tool called fs2pv which extracts the SPI written by F * .…”
Section: Related Workmentioning
confidence: 99%