2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS) 2018
DOI: 10.1109/iccons.2018.8663230
|View full text |Cite
|
Sign up to set email alerts
|

It's More Than Stealing Cookies - Exploitability of XSS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Rodrí guez et al conducted mitigation research on Cross-Site Scripting vulnerabilities with the results of being able to mitigate these attacks showing that the trend is increasing in proposals that analyze web page content (13.20%), as well as those that serve as toolkits for web browsers (16.98%) using artificial intelligence techniques [12]. His research explained that XSS vulnerabilities could be exploited by stealing the victim's cookie and making the cookie login remotely, namely by utilizing the CORS (Cross-Origin Resource Sharing) working principle on di browser web [20]. Gunawan et al conducted research on XSS attacks by sending HTTP GET requests to a web server using Java Script that connected all web browsers to the BeFF tool on Kali Linux.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Rodrí guez et al conducted mitigation research on Cross-Site Scripting vulnerabilities with the results of being able to mitigate these attacks showing that the trend is increasing in proposals that analyze web page content (13.20%), as well as those that serve as toolkits for web browsers (16.98%) using artificial intelligence techniques [12]. His research explained that XSS vulnerabilities could be exploited by stealing the victim's cookie and making the cookie login remotely, namely by utilizing the CORS (Cross-Origin Resource Sharing) working principle on di browser web [20]. Gunawan et al conducted research on XSS attacks by sending HTTP GET requests to a web server using Java Script that connected all web browsers to the BeFF tool on Kali Linux.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Due to the lack of security awareness and the around usage of Web Application Firewall (WAF) technology, it is common for developers to ignore the vulnerability on the source code level. Although WAF technology can usually intercept a considerable number of malicious attacks, a secure Web application should not rely solely on WAF technology to secure it [1]. If the source code is not reasonably modified, threats will always exist.…”
Section: Introductionmentioning
confidence: 99%