Reference Hub33
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud

Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud

B. B. Gupta, Shashank Gupta, Pooja Chaudhary
Copyright: © 2017 |Volume: 7 |Issue: 1 |Pages: 31
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522515012|DOI: 10.4018/IJCAC.2017010101
Cite Article Cite Article

MLA

Gupta, B. B., et al. "Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud." IJCAC vol.7, no.1 2017: pp.1-31. http://doi.org/10.4018/IJCAC.2017010101

APA

Gupta, B., Gupta, S., & Chaudhary, P. (2017). Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud. International Journal of Cloud Applications and Computing (IJCAC), 7(1), 1-31. http://doi.org/10.4018/IJCAC.2017010101

Chicago

Gupta, B. B., Shashank Gupta, and Pooja Chaudhary. "Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud," International Journal of Cloud Applications and Computing (IJCAC) 7, no.1: 1-31. http://doi.org/10.4018/IJCAC.2017010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article presents a cloud-based framework that thwarts the DOM-based XSS vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 web applications. Initially, the framework collects the key modules of web application, extracts the suspicious HTML5 strings from the latent injection points and performs the clustering on such strings based on their level of similarity. Further, it detects the injection of malicious HTML5 code in the script nodes of DOM tree by detecting the variation in the HTML5 code embedded in the HTTP response generated. Any variation observed will simply indicate the injection of suspicious script code. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment on the Google Chrome extension. The experimental evaluation of our framework was performed on the platform of real world HTML5 web applications deployed in the cloud platform.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.