Abstract
Web protection against XSS attacks is an indispensable tool for implementing reliable online systems. XSS attacks can be used for various malicious actions and stealing important information. Protection may be implemented both on user computer and on server side. In this work we have analyzed the server side protection solutions. These solutions must ensure appropriate level of security and at the same time should not considerably increase page response time. The aim of this paper is to determine the most effective and safe free tools for protection against XSS attacks for web pages created using PHP, ASP.NET and Java technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Acker, S., Nikiforakis, N., Desmet, L., Joosen, W., Piessens, F.: FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM (2012)
Balduzzi, M., Gimenez, C., Balzarotti, D., Kirda, E.: Automated discovery of parameter pollution vulnerabilities in web applications. In: Proceedings of the 18th Network and Distributed System Security Symposium (2011)
Bates, D., Barth, A., Jackson, C.: Regular expressions considered harmful in client-side XSS filters. In: Proceedings of the 19th International Conference on World Wide Web, pp. 91–100. ACM (2010)
Brooks, M.: Bypassing Internet Explorer’s XSS Filter. Traps of Gold-Defcon (2011)
Bugeja, J., Price, G.: A Pragmatic, Policy-Driven Framework for Protection Against Cross-Site Scripting. Royal Holloway Series (2012)
Curtsinger, C., Livshits, B., Zorn, B.G., Seifert, C.: ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection. In: USENIX Security Symposium (2011)
FireHost Inc.: Cross-Site Scripting Attacks Up 160% in Final Quarter of 2012 (2013), http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012
Galan, E., Alcaide, A., Orfila, A., Blasco, J.: A multi-agent scanner to detect stored-XSS vulnerabilities. In: Proceedings of the International Conference for Internet Technology and Secured Transactions, pp. 1–6 (2010)
Grossman, J., Hansen, R., Petkov, P.D., Rager, A., Fogie, S.: XSS Attacks: Cross-Site Scripting Exploits and Defense. Syngress (2007)
Hidhaya, S.F., Geetha, A.: Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 252–263. Springer, Heidelberg (2012)
Hooimeijer, P., Livshits, B., Molnar, D., Saxena, P., Veanes, M.: Fast and precise sanitizer analysis with BEK. In: Proceedings of the 20th USENIX Conference on Security (2011)
Hope, P., Walther, B.: Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast. O’Reilly Media, Inc. (2008)
HTML Purifier, http://htmlpurifier.org
htmLawed, http://www.bioinformatics.org/phplabware/internal_utilities/htmLawed/index.php
Klein, A.: DOM-based Cross-Site Scripting of the Third Kind, http://www.webappsec.org/projects/articles/071105.html
Korscheck, C.: Automatic Detection of Second-Order Cross-Site Scripting Vulnerabilities. Diploma Thesis, Wilhelm-Schickard-Institut fur Informatik University at Tubingen (2010)
Kotha, R., Prasad, K., Naik, D.: Analysis of XSS attack mitigation techniques based on platforms and browsers. In: SEA, CLOUD, DKMP, CS & IT, vol. 5, pp. 395–405 (2012)
Lundeen, R., Ou, J., Rhodes, T.: New Ways I’m Going to Hack Your Web App. Blackhat AD (2011)
Microsoft Anti-Cross Site library V4.2, http://www.microsoft.com/en-us/download/details.aspx?id=28589
Hamada, M.H.A.: Client Side Action Against Cross Site Scripting Attacks. Degree of Master in Information Technology, Islamic University Faculty of Information Technology (2012)
Nadji, Y., Saxena, P., Song, D.: Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In: Network and Distributed System Security Symposium (2009)
National Institute of Standarts and Technology: CVE and CCE Statistics Query Page, http://web.nvd.nist.gov/view/vuln/statistics
Nunan, A.E., Souto, E., dos Santos, E.M., Feitosa, E.: Automatic Classification of Cross-Site Scripting in Web Pages Using Document-based and URL-based Features. In: Proceedings of ISCC, pp. 702–707 (2012)
Open Web Application Security Project: XSS (Cross Site Scripting) Prevention Cheat Sheet , https://www.owasp.org/index.php/XSS_Cross_Site_Scripting_Prevention_Cheat_Sheet
OWASP AntiSamy Project, https://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project
OWASP Java HTML Sanitizer Project, https://www.owasp.org/index.php/OWASP_Java_HTML_Sanitizer_Project
Pelizzi, R., Sekar, R.: Protection, usability and improvements in reflected XSS filters. In: Proceedings of the 7th ACM Symposium on Information (2012)
SafeHTMLChecker, http://doc.b2evo.net/v-1-9/evocore/_blogs-inc-_misc-_htmlchecker.class.php.html
Saxena, P., Molnar, D., Livshits, B.: Scriptgard: Preventing script injection attacks in legacy web applications with automatic sanitization. Tech. rep., Microsoft Research (2010)
Selvamani, K., Duraisamy, A., Kannan, A.: Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side. International Journal of Computer Science and Information Security 7, 229–236 (2010)
Shar, L.K., Tan, H.: Automated removal of cross site scripting vulnerabilities in web applications. Information and Software Technology 54, 467–478 (2012)
Tibom, P.: Incapsula vs. CloudFlare. Security Review & Comparison (2012)
TidyManaged, https://github.com/markbeaton/TidyManaged
The OWASP Enterprise Security API, https://www.owasp.org/index.php/ESAPI
Wang, Y., Li, Z., Guo, T.: Program Slicing Stored XSS Bugs in Web Application. In: Proceeding of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, pp. 191–194 (2011)
Weinberger, J., Saxena, P., Akhawe, D., Finifter, M., Shin, R., Song, D.: A systematic analysis of XSS sanitization in web application frameworks. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 150–171. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ceponis, J., Ceponiene, L., Venckauskas, A., Mockus, D. (2013). Evaluation of Open Source Server-Side XSS Protection Solutions. In: Skersys, T., Butleris, R., Butkiene, R. (eds) Information and Software Technologies. ICIST 2013. Communications in Computer and Information Science, vol 403. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41947-8_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-41947-8_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41946-1
Online ISBN: 978-3-642-41947-8
eBook Packages: Computer ScienceComputer Science (R0)