Auditing the XSS defence features implemented in web application programs

Cross site scripting (XSS) vulnerability is mainly caused by the failure of web applications in sanitising user inputs embedded in web pages. Even though state-of-the-art defensive coding methods and vulnerability detection methods are often used by developers and security auditors, XSS flaws still...

Full description

Saved in:
Bibliographic Details
Main Authors: Shar, Lwin Khin, Tan, Hee Beng Kuan
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/107173
http://hdl.handle.net/10220/16667
http://dx.doi.org/10.1049/iet-sen.2011.0084
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-107173
record_format dspace
spelling sg-ntu-dr.10356-1071732019-12-06T22:26:01Z Auditing the XSS defence features implemented in web application programs Shar, Lwin Khin Tan, Hee Beng Kuan School of Electrical and Electronic Engineering DRNTU::Engineering::Computer science and engineering::Data Cross site scripting (XSS) vulnerability is mainly caused by the failure of web applications in sanitising user inputs embedded in web pages. Even though state-of-the-art defensive coding methods and vulnerability detection methods are often used by developers and security auditors, XSS flaws still remain in many applications because of (i) the difficulty of adopting these methods, (ii) the inadequate implementation of these methods, and/or (iii) the lack of understanding of XSS problem. To address this issue, this study proposes a code-auditing approach that recovers the defence model implemented in program source code and suggests guidelines for checking the adequacy of recovered model against XSS attacks. On the basis of the possible implementation patterns of defensive coding methods, our approach extracts all such defences implemented for securing each potentially vulnerable HTML output. It then introduces a variant of control flow graph, called tainted-information flow graph, as a model to audit the adequacy of XSS defence artefacts. The authors evaluated the proposed method based on the experiments on seven Java-based web applications. In the auditing experiments, our approach was effective in recovering all the XSS defence features implemented in the test subjects. The extracted artefacts were also shown to be useful for filtering the false-positive cases reported by a vulnerability detection method and helpful in fixing the vulnerable code sections. 2013-10-21T08:37:08Z 2019-12-06T22:26:01Z 2013-10-21T08:37:08Z 2019-12-06T22:26:01Z 2012 2012 Journal Article Shar, L.K., & Tan, H.B.K. (2012). Auditing the XSS defence features implemented in web application programs. IET Software, 6(4), 377-390. 1751-8806 https://hdl.handle.net/10356/107173 http://hdl.handle.net/10220/16667 http://dx.doi.org/10.1049/iet-sen.2011.0084 en IET Software
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering::Data
spellingShingle DRNTU::Engineering::Computer science and engineering::Data
Shar, Lwin Khin
Tan, Hee Beng Kuan
Auditing the XSS defence features implemented in web application programs
description Cross site scripting (XSS) vulnerability is mainly caused by the failure of web applications in sanitising user inputs embedded in web pages. Even though state-of-the-art defensive coding methods and vulnerability detection methods are often used by developers and security auditors, XSS flaws still remain in many applications because of (i) the difficulty of adopting these methods, (ii) the inadequate implementation of these methods, and/or (iii) the lack of understanding of XSS problem. To address this issue, this study proposes a code-auditing approach that recovers the defence model implemented in program source code and suggests guidelines for checking the adequacy of recovered model against XSS attacks. On the basis of the possible implementation patterns of defensive coding methods, our approach extracts all such defences implemented for securing each potentially vulnerable HTML output. It then introduces a variant of control flow graph, called tainted-information flow graph, as a model to audit the adequacy of XSS defence artefacts. The authors evaluated the proposed method based on the experiments on seven Java-based web applications. In the auditing experiments, our approach was effective in recovering all the XSS defence features implemented in the test subjects. The extracted artefacts were also shown to be useful for filtering the false-positive cases reported by a vulnerability detection method and helpful in fixing the vulnerable code sections.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Shar, Lwin Khin
Tan, Hee Beng Kuan
format Article
author Shar, Lwin Khin
Tan, Hee Beng Kuan
author_sort Shar, Lwin Khin
title Auditing the XSS defence features implemented in web application programs
title_short Auditing the XSS defence features implemented in web application programs
title_full Auditing the XSS defence features implemented in web application programs
title_fullStr Auditing the XSS defence features implemented in web application programs
title_full_unstemmed Auditing the XSS defence features implemented in web application programs
title_sort auditing the xss defence features implemented in web application programs
publishDate 2013
url https://hdl.handle.net/10356/107173
http://hdl.handle.net/10220/16667
http://dx.doi.org/10.1049/iet-sen.2011.0084
_version_ 1681042215733821440