JS']JS-SAN: defense mechanism for HTML']HTML5-based web applications against java']javascript code injection vulnerabilities

被引:18
作者
Gupta, Shashank [1 ]
Gupta, B. B. [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
!text type='java']java[!/text]script ([!text type='JS']JS[!/text]) code injection vulnerabilities; cross-site scripting (XSS) attack; sanitization; !text type='HTML']HTML[!/text]5; clustering;
D O I
10.1002/sec.1433
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an injection and clustering-based sanitization framework, i.e. JS-SAN (JavaScript SANitizer) for the mitigation of JS code injection vulnerabilities. It generates an attack vector template by performing the clustering on the extracted JS attack vector payloads corresponding to their level of similarity. As a result, it then sanitizes the extracted JS attack vector template by an automated technique of placement of sanitizers in the source code of generated templates of web applications. We have also performed the deepest possible crawling of web pages for finding the possible user-injection points and injected the latest HTML5-based XSS attack vectors for testing the mitigation capability of our framework. The implementation of our design was done on the browser-side JavaScript library and tested as an extension on the Google Chrome. The attack mitigation capability of JS-SAN was evaluated by incorporating the support from a tested suite of open source web applications that are vulnerable to JS code injection vulnerabilities. The proposed framework validates its novelty by producing a less rate of false negatives and tolerable runtime overhead as compared to existing sanitization-based approaches. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1477 / 1495
页数:19
相关论文
共 21 条
[1]  
[Anonymous], IGI GLOBALS ADV INFO
[2]  
[Anonymous], ARABIAN J SCI ENG
[3]  
[Anonymous], 2015, AC WEB APPL VULN REP
[4]  
[Anonymous], 2015, P 12 ACM INT C COMP
[5]   Saner: Composing static and dynamic analysis to validate sanitization in web applications [J].
Balzarotti, Davide ;
Cova, Marco ;
Felmetsger, Vika ;
Jovanovic, Nenad ;
Kirda, Engin ;
Kruegel, Christopher ;
Vigna, Giovanni .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :387-+
[6]  
Ceponis J, 2013, COMM COM INF SC, V403, P345
[7]  
CERT, 2000, ADV CA 2000 02 MAL H
[8]  
Cook S., 2003, WEB DEV GUIDE CROSS
[9]  
Gupta B.B., 2015, SECURED COMMUNICATIO, V11, P118, DOI [10.1080/15536548.2015.1044865, DOI 10.1080/15536548.2015.1044865]
[10]  
Gupta S., 2012, International journal of advanced computer research (IJACR), V2, P49