Prevention of cross-site scripting attacks on current web applications

被引:0
作者
Garcia-Alfaro, Joaquin [1 ]
Navarro-Arribas, Guillermo [2 ]
机构
[1] Univ Oberta Catalunya, Rambla Poble Nou 156, Barcelona 08018, Spain
[2] Autonomous Univ Barcelona, E-08193 Barcelona, Spain
来源
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS | 2007年 / 4804卷
关键词
software protection; code injection attacks; security policies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organizations. Web applications must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on the specific problem of preventing cross-site scripting attacks against web applications. We present a study of this kind of attacks, and survey current approaches for their prevention. The advantages and limitations of each proposal are discussed, and an alternative solution is introduced. Our proposition is based on the use of X.509 certificates, and XACML for the expression of authorization policies. By using our solution, developers and/or administrators of a given web application can specifically express its security requirements from the server side, and require the proper enforcement of such requirements on a compliant client. This strategy is seamlessly integrated in generic web applications by relaying in the SSL and secure redirect calls.
引用
收藏
页码:1770 / +
页数:4
相关论文
共 43 条
[1]  
ALCORNA W, 2006, J NETWORK SECURITY
[2]  
AMIT Y, 2005, XSS VULNERABILITIES
[3]  
ANDERSON A, 2005, SAML 2 O PROFILE XAC
[4]  
[Anonymous], 2005, EXTENSIBLE ACCESS CO
[5]  
[Anonymous], 2002, P 11 INT C WORLD WID
[6]  
[Anonymous], 2007, CROSS SITE SCRIPTING
[7]  
[Anonymous], 2005, 20 IFIP INT INF SEC
[8]   Securing Web scripting [J].
Anupam, V ;
Mayer, A .
IEEE INTERNET COMPUTING, 1998, 2 (06) :46-55
[9]   Using programmer-written compiler extensions to catch security holes [J].
Ashcraft, K ;
Engler, D .
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, :143-159
[10]  
Cary C., 2004, International Journal of Management and Enterprise Development, V1, P164, DOI 10.1504/IJMED.2004.004391