메뉴 건너뛰기




Volumn 31, Issue 4, 2012, Pages 612-628

Noncespaces: Using randomization to defeat cross-site scripting attacks

Author keywords

Client side policy enforcement; Cross site scripting; Defense; Information flow tracking; Security; Web application; World wide web

Indexed keywords

CROSS SITE SCRIPTING; DEFENSE; INFORMATION FLOWS; POLICY ENFORCEMENT; SECURITY; WEB APPLICATION;

EID: 84861099922     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.12.004     Document Type: Article
Times cited : (46)

References (50)
  • 1
    • 84861092051 scopus 로고    scopus 로고
    • ab - Apache HTTP server benchmarking tool [accessed 20.03.11]
    • ab - Apache HTTP server benchmarking tool. http://httpd.apache.org/docs/ 2.2/programs/ab.html; 2010. [accessed 20.03.11].
    • (2010)
  • 10
  • 15
    • 35348860223 scopus 로고    scopus 로고
    • Defeating script injection attacks with browser-enforced embedded policies
    • DOI 10.1145/1242572.1242654, 16th International World Wide Web Conference, WWW2007
    • T. Jim, N. Swamy, and M. Hicks Defeating scripting attacks with browser-enforced embedded policies Proceedings of the international World Wide Web conference (WWW) 2007 ACM Banff, Alberta, Canada 601 610 (Pubitemid 47582289)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 601-610
    • Jim, T.1    Swamy, N.2    Hicks, M.3
  • 16
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • G.S. Kc, A.D. Keromytis, and V. Prevelakis Countering code-injection attacks with instruction-set randomization CCS '03: Proceedings of the 10th ACM conference on computer and communications security 2003 ACM Washington D.C., USA 272 280 (Pubitemid 40673809)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 272-280
    • Kc, G.S.1    Keromytis, A.D.2    Prevelakis, V.3
  • 17
    • 33751032654 scopus 로고    scopus 로고
    • Noxes: A client-side solution for mitigating cross-site scripting attacks
    • Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
    • E. Kirda, C. Kruegel, G. Vigna, and N. Jovanovic Noxes: a client-side solution for mitigating cross site scripting attacks Proceedings of the ACM symposium on applied computing (SAC) 2006 330 337 Dijon, France (Pubitemid 44758802)
    • (2006) Proceedings of the ACM Symposium on Applied Computing , vol.1 , pp. 330-337
    • Kirda, E.1    Kruegel, C.2    Vigna, G.3    Jovanovic, N.4
  • 20
    • 84861092053 scopus 로고    scopus 로고
    • Last accessed: Mar 20, 2011
    • G. Markham Script Keys Last accessed: Mar 20, 2011 2005 http://www.gerv.net/security/script-keys/
    • (2005) Script Keys
    • Markham, G.1
  • 21
    • 34848813573 scopus 로고    scopus 로고
    • Last accessed: Mar 20, 2011
    • G. Markham Content restrictions Last accessed: Mar 20, 2011 2007 http://www.gerv.net/security/content-restrictions/
    • (2007) Content Restrictions
    • Markham, G.1
  • 22
    • 77955186827 scopus 로고    scopus 로고
    • ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
    • IEEE Computer Society Berkeley, CA, USA
    • L.A. Meyerovich, and B. Livshits ConScript: specifying and enforcing fine-grained security policies for JavaScript in the browser IEEE Symposium on security and privacy 2010 IEEE Computer Society Berkeley, CA, USA 481 496
    • (2010) IEEE Symposium on Security and Privacy , pp. 481-496
    • Meyerovich, L.A.1    Livshits, B.2
  • 23
    • 84861098939 scopus 로고    scopus 로고
    • Microsoft Developer Network (msdn) Last accessed: Mar 20, 2011
    • Microsoft Developer Network (MSDN) About conditional comments Last accessed: Mar 20, 2011 2007 http://msdn.microsoft.com/en-us/library/ms537512. aspx
    • (2007) About Conditional Comments
  • 28
    • 84861100219 scopus 로고    scopus 로고
    • [accessed 20.03.11]
    • Opera Browser. http://www.opera.com/browser/; 2008. [accessed 20.03.11].
    • (2008) Opera Browser
  • 30
    • 84861092109 scopus 로고    scopus 로고
    • [accessed 20.03.11]
    • D. Ross IE8 security part IV: the XSS filter [accessed 20.03.11] 2008 http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss- filter.aspx
    • (2008) IE8 Security Part IV: The XSS Filter
    • Ross, D.1
  • 32
    • 84861098941 scopus 로고    scopus 로고
    • Sahi [accessed 20.03.11]
    • Sahi http://sahi.co.in/; 2011. [accessed 20.03.11].
    • (2011)
  • 33
    • 84861094308 scopus 로고    scopus 로고
    • Samy [accessed 20.03.11]
    • Samy Technical explanation of the MySpace worm [accessed 20.03.11] 2006 http://web.archive.org/web/20060208182348/namb.la/popular/tech.html
    • (2006) Technical Explanation of the MySpace Worm
  • 34
    • 84861100329 scopus 로고    scopus 로고
    • [accessed 20.03.11]
    • Selenium IDE. http://seleniumhq.org/projects/ide/; 2011. [accessed 20.03.11].
    • (2011) Selenium IDE
  • 35
    • 84861098940 scopus 로고    scopus 로고
    • [accessed 20.03.11]
    • O. Shezaf The universal XSS PDF vulnerability [accessed 20.03.11] 2007 http://www.owasp.org/images/4/4b/OWASP-IL-The-Universal-XSS-PDF-Vulnerability
    • (2007) The Universal XSS PDF Vulnerability
    • Shezaf, O.1
  • 36
    • 59149095353 scopus 로고    scopus 로고
    • [accessed 20.03.11]
    • Smarty Template Engine. http://www.smarty.net/; 2008. [accessed 20.03.11].
    • (2008) Smarty Template Engine
  • 40
    • 82155200850 scopus 로고    scopus 로고
    • Blueprint: Robust prevention of cross-site scripting attacks for existing browsers
    • IEEE Computer Society Berkeley, CA, USA
    • M. Ter Louw, and V.N. Venkatakrishnan Blueprint: robust prevention of cross-site scripting attacks for existing browsers IEEE symposium on security and privacy 2009 IEEE Computer Society Berkeley, CA, USA 331 346
    • (2009) IEEE Symposium on Security and Privacy , pp. 331-346
    • Ter Louw, M.1    Venkatakrishnan, V.N.2
  • 41
    • 79958739058 scopus 로고    scopus 로고
    • Open Web Application Security Project T. [accessed 20.03.11]
    • The Open Web Application Security Project Cross-site scripting (XSS) [accessed 20.03.11] 2010 http://www.owasp.org/index.php/Cross-site-Scripting- %2528xSS%2529
    • (2010) Cross-site Scripting (XSS)
  • 42
    • 84861100599 scopus 로고    scopus 로고
    • TikiWiki CMS/groupware [accessed 20.03.11]
    • TikiWiki CMS/groupware. http://info.tikiwiki.org/tiki-index.php; 2010. [accessed 20.03.11].
    • (2010)
  • 44
  • 46
    • 67650077365 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • DOI 10.1145/1250734.1250739, PLDI'07: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation
    • G. Wassermann, and Z. Su Sound and precise analysis of web applications for injection vulnerabilities Proceedings of the ACM SIGPLAN 2007 conference on programming language design and implementation 2007 ACM Press San Diego, CA 32 41 New York, NY, USA (Pubitemid 47630673)
    • (2007) Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) , pp. 32-41
    • Wassermann, G.1    Su, Z.2
  • 50
    • 85038810709 scopus 로고    scopus 로고
    • Taint-Enhanced policy enforcement: A Practical approach to defeat a wide range of attacks
    • USENIX Association Vancouver, B.C., Canada
    • W. Xu, S. Bhatkar, and R. Sekar Taint-Enhanced policy enforcement: a Practical approach to defeat a wide range of attacks USENIX security symposium. USENIX the advanced computing systems Association 2006 USENIX Association Vancouver, B.C., Canada 121 136
    • (2006) USENIX Security Symposium. USENIX the Advanced Computing Systems Association , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.