skip to main content
research-article

BIXSAN: browser independent XSS sanitizer for prevention of XSS attacks

Published: 30 September 2011 Publication History

Abstract

Proliferation of social networking sites, and web applications which deliver dynamic content to the clients have increased the user created HTML content in the World Wide Web. This user-created HTML content can be a notorious vector for Cross-Site Scripting,(XSS) attacks. XSS attacks have the ability to target websites, steal confidential information of the users, and hijack their accounts, etc. XSS attacks are launched to exploit the vulnerabilities of the poorly developed application code and data processing systems. In particular, improper validation of user created content and un-sanitized custom error messages introduce vulnerability for XSS attacks. It is a challenging task for any security mechanism to filter out only the harmful HTML content and retain safe content with high fidelity and robustness. This has motivated us to develop a mechanism that filters out the harmful HTML content, and allows safe HTML. The existing solutions to XSS attack include use of regular expressions to detect the presence of dynamic content and client side filtering mechanisms such as Noscript and Noxes tool. The drawbacks of these solutions are low fidelity and disallowing of benign HTML. In order to overcome these drawbacks BIXSAN, a Browser Independent XSS SANitizer for prevention of XSS attacks is proposed in this paper. BIXSAN includes the proposition of three pronged strategy. These strategies are as follows: Firstly the use of complete HTML parser is proposed rather than approximating the behavior of parser. The advantage of using complete HTML parser is that it offers high fidelity. Secondly the use of modified browser, viz., JavaScript Tester is proposed to detect the presence of JavaScript for filtering it out. Thirdly, identification of static tags is proposed for allowing the benign HTML. Further, BIXSAN includes the proposition of a parse tree generator at client side browser to reduce the anomalous behavior of browsers. BIXSAN was experimented in various browsers such as Opera, Netscape, Internet Explorer (IE), and Firefox and found to work for all the browsers. From the experiments conducted it has been found that the proposed BIXSAN prevents the injection of XSS attack code successfully. Further, it has been verified that BIXSAN reduces the anomalous behavior of browse.

References

[1]
OECD Directorate for Science, Technology and Industry, Participative Web and User-Created Content: Web 2.0, Wikis and Social Networking. OECD Publishing, Oct. 2007 Ch. 2, pp.19--25.
[2]
Open Web Application Security Project, "OWASP Top ten web vulnerabilities "https://www.owasp.org/index.php/Top_10_2007
[3]
"XSSed | Cross Site Scripting (XSS) attacks information and archive" www.xssed.com
[4]
Jayamsakthi Shanmugam and M. Ponnavaikko "Cross Site Scripting-Latest developments and solutions: A survey Int. J. Open Problems Compt. Math., Vol. 1, No. 2, pp. 8--28, September 2008
[5]
"Cross-site scripting -- Wikipedia", http://en.wikipedia.org/wiki/Cross-site_scripting.
[6]
"Same origin policy" http://en.wikipedia.org/w/index.php?title=Same originpolicy&oldid=190222964
[7]
"HTTP cookie -- Wikipedia" http://en.wikipedia.org/wiki/HttpOnly#cookie_theft.
[8]
E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic, "Noxes: A clientside solution for mitigating cross-site scripting attacks," in 21st Annual ACM Symposium on Applied Computing, Dijon, France, pp. 330--337, Apr. 2006.
[9]
D. Ross, "IE 8 XSS filter architecture / implementation," http://blogs.technet.com/swi/archive/2008/08/19/ie-8-xss-filterarchitecture-implementation.asp
[10]
Daniel Bates, Adam Barth, Collin Jackson," Regular Expressions Considered Harmful in Client-Side XSS Filters," International World Wide Web Conference Committee (IW3C2) 2010, Raleigh, North Carolina, USA. ACM. pp. 91--100.
[11]
R. Hansen, "XSS (cross site scripting) cheat sheet esp: for filter evasion," 2008. http://ha.ckers.org/xss.html
[12]
E.Z. zang "HTML purifier: default whitelist" available: http://htmlpurifier.org/live/smoketests/printDefinition.php
[13]
World Wide Web consortium "Document Object Model level 2 core specification "http://www.w3c.org/TR/DOM-level-2-core/
[14]
Conceptual architecture of firefox. http://web.uvic.ca/~hitchner/assign1.pdf
[15]
M. wallent, "about Dynamic properties". http://msdn.microsoft.com/en-us/library/ms537634.aspx
[16]
XSS(cross site scsripting ) prevention cheat sheet OWASP http://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet

Cited By

View all
  • (2020)Case Study: Extenuation of XSS Attacks through Various Detecting and Defending TechniquesJournal of Applied Security Research10.1080/19361610.2020.173528316:1(91-126)Online publication date: 19-Mar-2020
  • (2019)A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social NetworkInternational Journal of Information Technology and Web Engineering10.4018/IJITWE.201901010514:1(85-111)Online publication date: Jan-2019
  • (2018)Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social networkFuture Generation Computer Systems10.1016/j.future.2017.05.03879(319-336)Online publication date: Feb-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 36, Issue 5
September 2011
160 pages
ISSN:0163-5948
DOI:10.1145/2020976
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 September 2011
Published in SIGSOFT Volume 36, Issue 5

Check for updates

Author Tags

  1. BIXSAN client side parse tree generator
  2. HTML parser
  3. JavaScript tester
  4. static tags

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Case Study: Extenuation of XSS Attacks through Various Detecting and Defending TechniquesJournal of Applied Security Research10.1080/19361610.2020.173528316:1(91-126)Online publication date: 19-Mar-2020
  • (2019)A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social NetworkInternational Journal of Information Technology and Web Engineering10.4018/IJITWE.201901010514:1(85-111)Online publication date: Jan-2019
  • (2018)Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social networkFuture Generation Computer Systems10.1016/j.future.2017.05.03879(319-336)Online publication date: Feb-2018
  • (2015)Current state of research on cross-site scripting (XSS) – A systematic literature reviewInformation and Software Technology10.1016/j.infsof.2014.07.01058(170-186)Online publication date: Feb-2015
  • (2013)Prevention of XSS attacks using STCDACM SIGSOFT Software Engineering Notes10.1145/2413038.238276838:1(46-49)Online publication date: 23-Jan-2013
  • (2013)Prevention of XSS attacks using STCDACM SIGSOFT Software Engineering Notes10.1145/2382756.238276837:6(1-9)Online publication date: 23-Jan-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media