2009 ICSE Workshop on Software Engineering for Secure Systems 2009
DOI: 10.1109/iwsess.2009.5068456
|View full text |Cite
|
Sign up to set email alerts
|

SWAP: Mitigating XSS attacks using a reverse proxy

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 95 publications
(48 citation statements)
references
References 9 publications
0
44
0
1
Order By: Relevance
“…Wurzinger et al [8] introduced a tool known as SWAP (Secure Web Application Proxy), a server-side solution for discovering and preventing cross-site scripting attacks. SWAP contain a reverse proxy that intercepts all HTML responses, as well as a make use of modified Web browser to detect script content.…”
Section: Related Workmentioning
confidence: 99%
“…Wurzinger et al [8] introduced a tool known as SWAP (Secure Web Application Proxy), a server-side solution for discovering and preventing cross-site scripting attacks. SWAP contain a reverse proxy that intercepts all HTML responses, as well as a make use of modified Web browser to detect script content.…”
Section: Related Workmentioning
confidence: 99%
“…Two main techniques are used to block the propagation of an XSS attack from the server to a client: signature-based and behavior-based like the SWAP approaches [3]. While the first approach cannot block new attacks (no known signature), the second fails in detecting browser specific XSS (a known limitation for SWAP), like the ones shown in [4].…”
Section: Background On Cross-site Scripting (Xss)mentioning
confidence: 99%
“…Attacks should be tailored to the injection point to be effective like in Duchene et al approach [22]; otherwise, depending on the injection point, your XSS attack can be rendered useless (while with the same vector, an attacker can succeed). Most of XSS research works focus either on detection of XSS attacks [1], [3], or on finding XSS vulnerabilities [23], [24]. Other related papers study XSS vulnerabilities or XSS worms [25], [26].…”
Section: Related Workmentioning
confidence: 99%
“…Using of the shield in front of WebGoat [19] (which is a vulnerable OWASP web application used for teaching security) is a good example to show how the bypass-shield provides extra security, and where it does not. As shown in WebGoat, the developers focus very often the fields that are under user's control (like text fields), and neglect performing input validation on other fields, like check boxes or select lists, which have predefined values.…”
Section: Impact Of Enforcing Constraints On Securitymentioning
confidence: 99%