A survey on detection techniques to prevent cross-site scripting attacks on current web applications

Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models, organizations, and so on. Moreover, critical systems such as those related to health care, banking, or even emergency response, are relying on such applications and services. Web applications must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on the specific problem of preventing crosssite scripting attacks against web applications. We present a study of this kind of attacks, and survey current approaches for their prevention. Applicability and limitations of each proposal are also discussed.

Original languageEnglish
Title of host publicationCritical Information Infrastructures Security - Second International Workshop, CRITIS 2007, Revised Papers
Pages287-298
Number of pages12
DOIs
Publication statusPublished - 1 Dec 2008
Externally publishedYes
Event2nd International Workshop on Critical Information Infrastructure Security, CRITIS 2007 - Malaga, Spain
Duration: 3 Oct 20075 Oct 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5141 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Workshop on Critical Information Infrastructure Security, CRITIS 2007
Country/TerritorySpain
CityMalaga
Period3/10/075/10/07

Keywords

  • Injection Attacks
  • Network Security
  • Software Protection

Fingerprint

Dive into the research topics of 'A survey on detection techniques to prevent cross-site scripting attacks on current web applications'. Together they form a unique fingerprint.

Cite this