메뉴 건너뛰기




Volumn 54, Issue 5, 1970, Pages 467-478

Automated removal of cross site scripting vulnerabilities in web applications

Author keywords

Automated bug fixing; Character escaping; Cross site scripting; Encoding; Injection vulnerability; Web security

Indexed keywords

ENCODING (SYMBOLS); PATTERN MATCHING; WEBSITES;

EID: 84855479474     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2011.12.006     Document Type: Article
Times cited : (70)

References (39)
  • 1
    • 85040757532 scopus 로고    scopus 로고
    • OWASP, November 2009, OWASP Top Ten project 2010. <> (accessed January 2010).
    • OWASP, November 2009, OWASP Top Ten project 2010. < http://www.owasp.org> (accessed January 2010).
  • 2
    • 85040758824 scopus 로고    scopus 로고
    • CWE/SANS, Top 25 Most Dangerous Programming Errors. <> (accessed June 2010).
    • CWE/SANS, 2010, Top 25 Most Dangerous Programming Errors. < http://www.applicure.com/blog/cwe-sans-top-25-dangerous-programming-errors> (accessed June 2010).
    • (2010)
  • 3
    • 85040754413 scopus 로고    scopus 로고
    • CWE, June 2010, CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’). <> (accessed June 2010).
    • CWE, June 2010, CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’). < http://cwe.mitre.org/data/definitions/79.html> (accessed June 2010).
  • 4
    • 85040754766 scopus 로고    scopus 로고
    • OWASP, June 2010, XSS (Cross Site Scripting) Prevention Cheat Sheet. (accessed January 2010).
    • OWASP, June 2010, XSS (Cross Site Scripting) Prevention Cheat Sheet. < http://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet> (accessed January 2010).
  • 5
    • 85040761774 scopus 로고    scopus 로고
    • US-CERT, Microsoft.NET Framework Contains a Cross-Site Scripting Vulnerability, October 2006. <> (accessed January 2010).
    • US-CERT, Microsoft.NET Framework Contains a Cross-Site Scripting Vulnerability, October 2006. < http://www.kb.cert.org/vuls/id/455604> (accessed January 2010).
  • 6
    • 85040759034 scopus 로고    scopus 로고
    • May 2010, Vodafone.com XSS helps you trace unregistered “Pay As You Go” subscribers. <> (accessed June 2010).
    • May 2010, Vodafone.com XSS helps you trace unregistered “Pay As You Go” subscribers. < http://www.xssed.com/newslist> (accessed June 2010).
  • 7
    • 85040753330 scopus 로고    scopus 로고
    • Cross Site Scripting (XSS), May 2009. <> (accessed January 2010).
    • A. Mueller, Cross Site Scripting (XSS), May 2009. < http://elegantcode.com/2009/05/28/cross-site-scripting-xss/> (accessed January 2010).
    • Mueller, A.1
  • 8
    • 85040760644 scopus 로고    scopus 로고
    • ESAPI, OWASP Enterprise Security API. (accessed February 2010).
    • ESAPI, OWASP Enterprise Security API, 2009. < http://www.owasp.org/index.php/ESAPI#tab=Project_Details> (accessed February 2010).
    • (2009)
  • 9
    • 85040752874 scopus 로고    scopus 로고
    • July 2005, DOM based Cross Site Scripting or XSS of the Third Kind. <> (accessed April 2010).
    • A. Klein, July 2005, DOM based Cross Site Scripting or XSS of the Third Kind. < http://www.webappsec.org/projects/articles/071105.shtml> (accessed April 2010).
    • Klein, A.1
  • 10
    • 78651471115 scopus 로고    scopus 로고
    • Auditing the defense against cross site scripting in web applications
    • Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT’10)
    • L.K. Shar, H.B.K. Tan, Auditing the defense against cross site scripting in web applications, in: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT’10), 2010, pp. 505–511.
    • (2010) , pp. 505-511
    • Shar, L.K.1    Tan, H.B.K.2
  • 12
    • 85040761362 scopus 로고    scopus 로고
    • Soot, June 2008. Soot: a Java Optimization Framework. <> (accessed February 2009).
    • Soot, June 2008. Soot: a Java Optimization Framework. < http://www.sable.mcgill.ca/soot/> (accessed February 2009).
  • 13
    • 85040761092 scopus 로고    scopus 로고
    • W3C, HTML 4.01 Specification. <> (accessed April 2010).
    • W3C, 1999, HTML 4.01 Specification. < http://www.w3.org/TR/html401/> (accessed April 2010).
    • (1999)
  • 14
    • 85040754457 scopus 로고    scopus 로고
    • W3C, XHTML 1.0 Specification. <> (accessed August 2011).
    • W3C, 2002, XHTML 1.0 Specification. < http://www.w3.org/TR/xhtml1/> (accessed August 2011).
    • (2002)
  • 15
    • 85040749084 scopus 로고    scopus 로고
    • Sourceforge, Open source website. <> (accessed February 2009).
    • Sourceforge, Open source website. < http://www.sourceforge.net> (accessed February 2009).
  • 16
    • 85040750823 scopus 로고    scopus 로고
    • GotoCode, Open source website. <> (accessed September 2009).
    • GotoCode, Open source website. < http://www.gotocode.com> (accessed September 2009).
  • 17
    • 85040756291 scopus 로고    scopus 로고
    • RSnake, XSS (Cross Site Scripting) Cheat Sheet. <> (accessed March 2010).
    • RSnake, XSS (Cross Site Scripting) Cheat Sheet. < http://ha.ckers.org/xss.html> (accessed March 2010).
  • 18
    • 57849137358 scopus 로고    scopus 로고
    • On automated prepared statement generation to remove SQL injection vulnerabilities
    • Thomas, S., Williams, L., Xie, T., On automated prepared statement generation to remove SQL injection vulnerabilities. Inform. Softw. Technol. 51:3 (2009), 589–598.
    • (2009) Inform. Softw. Technol. , vol.51 , Issue.3 , pp. 589-598
    • Thomas, S.1    Williams, L.2    Xie, T.3
  • 19
    • 38949112510 scopus 로고    scopus 로고
    • Input validation analysis and testing
    • Hayes, J.H., Offutt, A.J., Input validation analysis and testing. Empirical Softw. Eng. 11:4 (2006), 493–522.
    • (2006) Empirical Softw. Eng. , vol.11 , Issue.4 , pp. 493-522
    • Hayes, J.H.1    Offutt, A.J.2
  • 20
    • 37049007001 scopus 로고    scopus 로고
    • Testing input validation in web applications through automated model recovery
    • Liu, H., Tan, H.B.K., Testing input validation in web applications through automated model recovery. J. Syst. Softw. 81:2 (2008), 222–233.
    • (2008) J. Syst. Softw. , vol.81 , Issue.2 , pp. 222-233
    • Liu, H.1    Tan, H.B.K.2
  • 21
    • 56749091982 scopus 로고    scopus 로고
    • Covering code behavior on input validation in functional testing
    • Liu, H., Tan, H.B.K., Covering code behavior on input validation in functional testing. Inform. Softw. Technol. 51:2 (2009), 546–553.
    • (2009) Inform. Softw. Technol. , vol.51 , Issue.2 , pp. 546-553
    • Liu, H.1    Tan, H.B.K.2
  • 22
    • 70349897832 scopus 로고    scopus 로고
    • MUTEC: mutation-based testing of cross site scripting
    • Proceedings of the 5th International Workshop on Software Engineering for Secure Systems (SESS’09)
    • H. Shahriar, M. Zulkernine, MUTEC: mutation-based testing of cross site scripting, in: Proceedings of the 5th International Workshop on Software Engineering for Secure Systems (SESS’09), 2009, pp. 47–53.
    • (2009) , pp. 47-53
    • Shahriar, H.1    Zulkernine, M.2
  • 23
    • 33745184790 scopus 로고    scopus 로고
    • Finding security errors in Java programs with static analysis
    • Proceedings of the 14th Usenix Security Symposium (USENIX Security’05)
    • V.B. Livshits, M.S. Lam, Finding security errors in Java programs with static analysis, in: Proceedings of the 14th Usenix Security Symposium (USENIX Security’05), 2005, pp. 271–286.
    • (2005) , pp. 271-286
    • Livshits, V.B.1    Lam, M.S.2
  • 24
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Proceedings of the 15th USENIX Security Symposium (USENIX Security’06)
    • Y. Xie, A. Aiken, Static detection of security vulnerabilities in scripting languages, in: Proceedings of the 15th USENIX Security Symposium (USENIX Security’06), 2006, pp. 179–192.
    • (2006) , pp. 179-192
    • Xie, Y.1    Aiken, A.2
  • 25
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: a static analysis tool for detecting web application vulnerabilities
    • Proceedings of the IEEE Symposium on Security and Privacy (S&P’06)
    • N. Jovanovic, C. Kruegel, E. Kirda, Pixy: a static analysis tool for detecting web application vulnerabilities, in: Proceedings of the IEEE Symposium on Security and Privacy (S&P’06), 2006, pp. 258–263.
    • (2006) , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 26
    • 33749823368 scopus 로고    scopus 로고
    • Static approximation of dynamically generated web pages
    • Proceedings of the 14th International Conference on World Wide Web (WWW’05)
    • Y. Minamide, Static approximation of dynamically generated web pages, in: Proceedings of the 14th International Conference on World Wide Web (WWW’05), 2005, pp. 432–441.
    • (2005) , pp. 432-441
    • Minamide, Y.1
  • 27
    • 57349153984 scopus 로고    scopus 로고
    • Static detection of cross-site scripting vulnerabilities
    • Proceedings of the 30th International Conference on Software Engineering (ICSE’08)
    • G. Wassermann, Z. Su, Static detection of cross-site scripting vulnerabilities, in: Proceedings of the 30th International Conference on Software Engineering (ICSE’08), 2008, pp. 171–180.
    • (2008) , pp. 171-180
    • Wassermann, G.1    Su, Z.2
  • 28
    • 19944365247 scopus 로고    scopus 로고
    • Securing web application code by static analysis and runtime protection
    • Proceedings of the 13th International Conference on World Wide Web (WWW’04)
    • Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, S.-Y. Kuo, Securing web application code by static analysis and runtime protection, in: Proceedings of the 13th International Conference on World Wide Web (WWW’04), 2004, pp. 40–52.
    • (2004) , pp. 40-52
    • Huang, Y.-W.1    Yu, F.2    Hang, C.3    Tsai, C.-H.4    Lee, D.-T.5    Kuo, S.-Y.6
  • 29
    • 85084163766 scopus 로고    scopus 로고
    • Automatic generation of XSS and SQL injection attacks with goal-directed model checking
    • Proceedings of the 17th USENIX Security Symposium (USENIX Security’08)
    • M. Martin, M.S. Lam, Automatic generation of XSS and SQL injection attacks with goal-directed model checking, in: Proceedings of the 17th USENIX Security Symposium (USENIX Security’08), 2008, pp. 31–43.
    • (2008) , pp. 31-43
    • Martin, M.1    Lam, M.S.2
  • 30
    • 77950880816 scopus 로고    scopus 로고
    • Securing web applications with static and dynamic information flow tracking
    • Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation
    • M.S. Lam, M. Martin, B. Livshits, J. Whaley, Securing web applications with static and dynamic information flow tracking, in: Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 2008, pp. 3–12.
    • (2008) , pp. 3-12
    • Lam, M.S.1    Martin, M.2    Livshits, B.3    Whaley, J.4
  • 31
    • 50249115131 scopus 로고    scopus 로고
    • Saner: composing static and dynamic analysis to validate sanitization in web applications, in: Proceedings of the IEEE Symposium on Security and Privacy
    • D. Balzarotti, et al., Saner: composing static and dynamic analysis to validate sanitization in web applications, in: Proceedings of the IEEE Symposium on Security and Privacy, 2008, pp. 387–401.
    • (2008) , pp. 387-401
    • Balzarotti, D.1
  • 32
    • 57449103850 scopus 로고    scopus 로고
    • Dynamic test input generation for web applications
    • Proceedings of the International Symposium on Software Testing and Analysis (ISSTA’10), 249–260.
    • G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, Z. Su, Dynamic test input generation for web applications, in: Proceedings of the International Symposium on Software Testing and Analysis (ISSTA’10), 2008, 249–260.
    • (2008)
    • Wassermann, G.1    Yu, D.2    Chander, A.3    Dhurjati, D.4    Inamura, H.5    Su, Z.6
  • 33
    • 77949879017 scopus 로고    scopus 로고
    • Automatic creation of SQL injection and cross-site scripting attacks
    • Proceedings of the 31st International Conference on Software Engineering (ICSE’09)
    • A. Kieżun, P.J. Guo, K. Jayaraman, M.D. Ernst, Automatic creation of SQL injection and cross-site scripting attacks, in: Proceedings of the 31st International Conference on Software Engineering (ICSE’09), 2009, pp. 199–209.
    • (2009) , pp. 199-209
    • Kieżun, A.1    Guo, P.J.2    Jayaraman, K.3    Ernst, M.D.4
  • 34
    • 60649084590 scopus 로고    scopus 로고
    • XSSDS: server-side detection of cross-site scripting attacks
    • Proceedings of the Annual Computer Security Applications Conference (ACSAC’08)
    • M. Johns, B. Engelmann, J. Posegga, XSSDS: server-side detection of cross-site scripting attacks, in: Proceedings of the Annual Computer Security Applications Conference (ACSAC’08), 2008, pp. 335–344.
    • (2008) , pp. 335-344
    • Johns, M.1    Engelmann, B.2    Posegga, J.3
  • 35
    • 49949119476 scopus 로고    scopus 로고
    • XSS-Guard: precise dynamic prevention of cross-site scripting attacks
    • Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA’08)
    • P. Bisht, V.N. Venkatakrishnan, XSS-Guard: precise dynamic prevention of cross-site scripting attacks, in: Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA’08), 2008, pp. 23–43.
    • (2008) , pp. 23-43
    • Bisht, P.1    Venkatakrishnan, V.N.2
  • 36
    • 80053079139 scopus 로고    scopus 로고
    • Static enforcement of web application integrity through strong typing
    • Proceedings of the 18th USENIX Security Symposium (USENIX Security’09)
    • W. Robertson, G. Vigna, Static enforcement of web application integrity through strong typing, in: Proceedings of the 18th USENIX Security Symposium (USENIX Security’09), 2009, pp. 283–298.
    • (2009) , pp. 283-298
    • Robertson, W.1    Vigna, G.2
  • 37
    • 72249104474 scopus 로고    scopus 로고
    • Improving application Security with Data Flow Assertions
    • Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP’09)
    • A. Yip, X. Wang, N. Zeldovich, M.F. Kaashoek, Improving application Security with Data Flow Assertions, in: Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP’09), 2009, pp. 291–304.
    • (2009) , pp. 291-304
    • Yip, A.1    Wang, X.2    Zeldovich, N.3    Kaashoek, M.F.4
  • 38
    • 35348860223 scopus 로고    scopus 로고
    • Defeating script injection attacks with browser-enforced embedded policies
    • Proceedings of the 16th International Conference on World Wide Web (WWW’07)
    • T. Jim, N. Swamy, M. Hicks, Defeating script injection attacks with browser-enforced embedded policies, in: Proceedings of the 16th International Conference on World Wide Web (WWW’07), 2007, pp. 601–610.
    • (2007) , pp. 601-610
    • Jim, T.1    Swamy, N.2    Hicks, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.