2016 International Conference on Computing, Networking and Communications (ICNC) 2016
DOI: 10.1109/iccnc.2016.7440629
|View full text |Cite
|
Sign up to set email alerts
|

Two for the price of one: A combined browser defense against XSS and clickjacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…X-Frame-Options security header has three options values which can be set: DENY, SAMEORIGIN, or ALLOW-FROM URI. DENY: stops any web-based domain application from enclosing the content; this is recommended setting for mitigating cyber-attacks such as clickjacking attacks [18] [26]. SAMEORIGIN allows only the current web application to frame its content.…”
Section: Proposed Secure Web-based Architecture Designmentioning
confidence: 99%
“…X-Frame-Options security header has three options values which can be set: DENY, SAMEORIGIN, or ALLOW-FROM URI. DENY: stops any web-based domain application from enclosing the content; this is recommended setting for mitigating cyber-attacks such as clickjacking attacks [18] [26]. SAMEORIGIN allows only the current web application to frame its content.…”
Section: Proposed Secure Web-based Architecture Designmentioning
confidence: 99%
“…al. [2] presented an extension of Mozilla Firefox browser and named as XBuster. It prevents end user from the attacks including XSS, clickjacking, partial script injection, attribute injection, and HTML injection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This study shows that research in the server-side approach area with the static analysis method is the most studied. Reflected XSS detection has been widely studied using regular expression and string-matching methods (Bates et al, 2010;Pelizzi & Sekar, 2012;Rao et al, 2016;Wang & Zhou, 2016) Most injection attacks research only focuses on how to detect these injection attacks, filtering input as a defense mechanism, or also preventing the entry of injection attacks code by utilizing third-party software such as intrusion detection system (Bisht & Venkatakrishnan, 2008;Bozic & Wotawa, 2013;Gupta & Gupta, 2017;Kumar Singh & Roy, 2012). However, no research discusses how to assess the ability of malicious hackers to exploit injection vulnerabilities of the complexity of the injection attacks.…”
Section: Introductionmentioning
confidence: 99%