(2013) 25 Million Flows Later - Large-scale Detection of DOM-based XSS.
|
Text
domxss.pdf - Published Version Download (968kB) | Preview |
Abstract
In recent years, the Web witnessed a move towards sophis- ticated client-side functionality. This shift caused a signifi- cant increase in complexity of deployed JavaScript code and thus, a proportional growth in potential client-side vulnera- bilities, with DOM-based Cross-site Scripting being a high impact representative of such security issues. In this paper, we present a fully automated system to detect and validate DOM-based XSS vulnerabilities, consisting of a taint-aware JavaScript engine and corresponding DOM implementation as well as a context-sensitive exploit generation approach. Using these components, we conducted a large-scale analysis of the Alexa top 5000. In this study, we identified 6167 unique vulnerabilities distributed over 480 domains, show- ing that 9,6% of the examined sites carry at least one DOM- based XSS problem.
Item Type: | Conference or Workshop Item (A Paper) (Paper) |
---|---|
Additional Information: | pub_id: 1050 Bibtex: lekies201325 URL date: None |
Divisions: | Ben Stock (Secure Web Applications Group, SWAG) |
Conference: | CCS ACM Conference on Computer and Communications Security |
Depositing User: | Sebastian Weisgerber |
Date Deposited: | 26 Jul 2017 10:28 |
Last Modified: | 18 Jul 2019 12:12 |
Primary Research Area: | NRA5: Empirical & Behavioral Security |
URI: | https://publications.cispa.saarland/id/eprint/3 |
Actions
Actions (login required)
View Item |