In this dissertation we examine web exploitation from a number of different perspectives. First, we introduce return-to-JavaScript attacks; a new flavor of Cross-Site Scripting (XSS), which is able to escape script whitelisting. Second, we design xJS, a system that can prevent code injections of JavaScript in web applications. xJS is based on the concept of Instruction Set Randomization (ISR) for isolating legitimate JavaScript from malicious injections. We evaluate xJS and show that the overhead it imposes in the server’s and the client’s side is negligible, since xJS is based on the fast XOR operation. Third, we deliver a more fine-grained randomization framework for web applications, RaJa, which can efficiently cope with language mixing....
Since the dawn of the Internet, all of us have been swept up by the Niagara of information that fill...
During XSS attacks, JavaScript-Code is being snuck into websites. There are several classes of XSS. ...
Abstract—Compromised websites that redirect web traffic to malicious hosts play a critical role in o...
In this dissertation we examine web exploitation from a number of different perspectives. First, we ...
The increased use of the World Wide Web and JavaScript as a scripting language for Web pages have ma...
Web applications allow users to receive and communicate content from remote servers through web brow...
AbstractThis paper discussed some of the performance issues in the existing defensive solutions of J...
JavaScript and PHP are two very popular languages in the world of coding, especially for websites an...
Existence of cross-site scripting (XSS) vulnerability can be traced back to 1995 during early days o...
Abstract. Due to its flexibility and dynamic character, JavaScript has become an important tool for ...
Malicious webpages with JavaScript code that launch attacks on web browsers have become an increasin...
In this technological era, many of the applications are taking the utilization of services of intern...
Cross-site scripting (XSS) is one of the most frequently occurring types of attacks on web applicati...
Recent web-based cyber attacks are evolving into a new form of attacks such as private information t...
Abstract. Add-on JavaScript originating from users ’ inputs to the browser brings new functionalitie...
Since the dawn of the Internet, all of us have been swept up by the Niagara of information that fill...
During XSS attacks, JavaScript-Code is being snuck into websites. There are several classes of XSS. ...
Abstract—Compromised websites that redirect web traffic to malicious hosts play a critical role in o...
In this dissertation we examine web exploitation from a number of different perspectives. First, we ...
The increased use of the World Wide Web and JavaScript as a scripting language for Web pages have ma...
Web applications allow users to receive and communicate content from remote servers through web brow...
AbstractThis paper discussed some of the performance issues in the existing defensive solutions of J...
JavaScript and PHP are two very popular languages in the world of coding, especially for websites an...
Existence of cross-site scripting (XSS) vulnerability can be traced back to 1995 during early days o...
Abstract. Due to its flexibility and dynamic character, JavaScript has become an important tool for ...
Malicious webpages with JavaScript code that launch attacks on web browsers have become an increasin...
In this technological era, many of the applications are taking the utilization of services of intern...
Cross-site scripting (XSS) is one of the most frequently occurring types of attacks on web applicati...
Recent web-based cyber attacks are evolving into a new form of attacks such as private information t...
Abstract. Add-on JavaScript originating from users ’ inputs to the browser brings new functionalitie...
Since the dawn of the Internet, all of us have been swept up by the Niagara of information that fill...
During XSS attacks, JavaScript-Code is being snuck into websites. There are several classes of XSS. ...
Abstract—Compromised websites that redirect web traffic to malicious hosts play a critical role in o...