2018 International Conference on Inventive Research in Computing Applications (ICIRCA) 2018
DOI: 10.1109/icirca.2018.8597221
|View full text |Cite
|
Sign up to set email alerts
|

Web Application Vulnerabilities - The Hacker's Treasure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…This form of XSS vulnerability is sometimes referred to as a persistent XSS. This is due to the fact that the malicious script is still present on the server after the attack has been completed [9]. During this type of attack, the attacker injects code that has been maliciously written onto the server in such a way that it cannot be removed.…”
Section: Stored Cross-site Scripting (Xss) Attackmentioning
confidence: 99%
“…This form of XSS vulnerability is sometimes referred to as a persistent XSS. This is due to the fact that the malicious script is still present on the server after the attack has been completed [9]. During this type of attack, the attacker injects code that has been maliciously written onto the server in such a way that it cannot be removed.…”
Section: Stored Cross-site Scripting (Xss) Attackmentioning
confidence: 99%
“…Evaluating information security systems on websites consists of three main things: hosting providers, website protocols such as HTTP/HTTPS, and website platforms. The evaluation aims to determine the vulnerability of the system [18]. This research focuses on mitigating XSS attacks through the website platform.…”
Section: Introductionmentioning
confidence: 99%
“…In this part, the XSS vulnerability relies on a browser, which can be attacked by XSS as long as you use it. Therefore, the attacks, often being the first step of other advanced attacks, directly threaten user privacy and server security, resulting in information disclosure, command execution, and so on [1,2]. There have already been many research teams that have introduced machine learning and deep learning algorithms into XSS attack detection [3].…”
Section: Introductionmentioning
confidence: 99%