2018
DOI: 10.1016/j.future.2017.05.038
|View full text |Cite
|
Sign up to set email alerts
|

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 42 publications
(19 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…Physically testing for DOM-based XSS emerging from URL parameters includes a similar process: setting a few basic interesting inputs, utilizing the browser's designer tools to look the DOM for this input, and testing each area to decide whether it is exploitable [10]. However, other sorts of DOM XSS are harder to identify.…”
Section: Discussion -Conclusionmentioning
confidence: 99%
See 1 more Smart Citation
“…Physically testing for DOM-based XSS emerging from URL parameters includes a similar process: setting a few basic interesting inputs, utilizing the browser's designer tools to look the DOM for this input, and testing each area to decide whether it is exploitable [10]. However, other sorts of DOM XSS are harder to identify.…”
Section: Discussion -Conclusionmentioning
confidence: 99%
“…XSS attacks can also be categorized into two groups: stored and reflected. There is a third, much less well-known type of XSS attack called DOM Based XSS [10].…”
mentioning
confidence: 99%
“…[37][38][39] On the other hand, the rest of the solutions demand major alterations in the existing settings of such defensive frameworks. [37][38][39] On the other hand, the rest of the solutions demand major alterations in the existing settings of such defensive frameworks.…”
Section: Secure and Efficient Integration Of Proposed Security Model mentioning
confidence: 99%
“…That means that there are multiple sources of information that are used to understand the real users' needs, and at the same time, they make the recommendation effectiveness relative, since the nature of these data is unstable and relative. For example, a recommended cloud service via a social network [110][111][112] could satisfy customers, because it represents the user's opinion and behavior. However, not all the clients will reach the same level of satisfaction or all the time the selected service is adequate and certain adaptively.…”
Section: Cloud Service Recommendationmentioning
confidence: 99%