Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2017, Number 35, Pages 63–75
DOI: https://doi.org/10.17223/20710410/35/6
(Mi pdm576)
 

This article is cited in 1 scientific paper (total in 1 paper)

Mathematical Foundations of Computer Security

Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browser

D. A. Sigalov, A. V. Razdobarov, A. A. Petukhov

Lomonosov Moscow State University, Moscow, Russia
Full-text PDF (542 kB) Citations (1)
References:
Abstract: In recent years, a significant part of web application functionality moves to client side. Increasing complexity of client-side code leads to a considerable growth in the number of client-side vulnerabilities and even to an emergence of new types of vulnerabilities, among which DOM-based XSS is most well-known. In this paper, we present an approach to detect and validate DOM-based XSS vulnerabilities. Our approach leverages dynamic tracking of data flows on the client side of web application to identify insecure ones (those which lead to vulnerability). An insecure data flow is a flow, in which a critical operation is data-dependent on attacker-controlled data, which is not sanitised properly. Data flows are tracked and classified using taint propagation technique (also known as “taint checking”). Potentially insecure data flows are tested for the presence of exploitable vulnerability by means of fuzzing – enumeration of possible attack vectors, which are passed to a data flow source. Vulnerability is confirmed if an execution of any injected payload is observed. Our approach was implemented on top of Firefox browser, controlled via it's debugger API. The paper discusses and justifies advantages of such implementation. The paper also provides an analysis of related work in the subject field, and comparison with other approaches is made. The proposed approach and its implementation are maintainable and extensible, which is crucial for analyzing applications in constantly evolving environment such as client side web technologies.
Keywords: DOM-based XSS, web application vulnerabilities, dynamic analysis, fuzzing.
Bibliographic databases:
Document Type: Article
UDC: 004.056.53
Language: Russian
Citation: D. A. Sigalov, A. V. Razdobarov, A. A. Petukhov, “Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browser”, Prikl. Diskr. Mat., 2017, no. 35, 63–75
Citation in format AMSBIB
\Bibitem{SigRazPet17}
\by D.~A.~Sigalov, A.~V.~Razdobarov, A.~A.~Petukhov
\paper Detecting DOM-based XSS vulnerabilities using debug API of the modern web-browser
\jour Prikl. Diskr. Mat.
\yr 2017
\issue 35
\pages 63--75
\mathnet{http://mi.mathnet.ru/pdm576}
\crossref{https://doi.org/10.17223/20710410/35/6}
Linking options:
  • https://www.mathnet.ru/eng/pdm576
  • https://www.mathnet.ru/eng/pdm/y2017/i1/p63
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
    Statistics & downloads:
    Abstract page:265
    Full-text PDF :911
    References:26
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024