Skip to main content

Study on the Detection of Cross-Site Scripting Vulnerabilities Based on Reverse Code Audit

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9937))

Abstract

Cross-Site Scripting (XSS) is one of the most popular methods of current network attacks. The attackers mainly put malicious script into a web page through the vulnerabilities of the web application. This paper proposes an improved approach based on reverse code audit and static analysis to detect and extract the XSS vulnerabilities in the source code of the web application. In this paper, we give the theoretical definition and implementation algorithm related to this method. Also, our method can find the location of the vulnerability and the vulnerability of data source through the data link, so that testers and developers can fix vulnerabilities in Web applications immediately. Finally, the method is verified by experiment, which show that the method can not only effectively detect the potential XSS vulnerabilities in the code, but also significantly improve the detection efficiency of XSS vulnerabilities based on static analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Open Web application security project. OWASP top 10-2013. The Ten Most Critical Web Application Security Risks (2013). https://www.owasp.org/index.php/Top_10_2013

  2. Wang, W., Li, J.: Web Application Security Threats and Prevention: Based on OWASP Top 10 and ESAPI, vol. 1. Electronic Industry Press, Beijing (2013)

    Google Scholar 

  3. Soot. Soot: a Java Optimization Framework. http://www.sable.mcgill.ca/soot/. Accessed 12 Feb. 2009

  4. Dorigo, M., Caro, G.D., Gambardella, L.M.: Ant algorithms for discrete optimization. Artif. Life 5(2), 137–172 (1999)

    Article  Google Scholar 

  5. Hydara, I., Sultan, A.B.M., Zulzalil, H., et al.: Current state of research on cross-site scripting (XSS)–a systematic literature review. Inf. Softw. Technol. 58, 170–186 (2014)

    Article  Google Scholar 

  6. Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: a static analysis tool for detecting web application vulnerabilities (short paper). In: 2006 IEEE Symposium on Security and Privacy, pp. 258–263 (2006)

    Google Scholar 

  7. Anley, C.: Advanced SQL injection in SQL server applications. Insight Security Research (2002)

    Google Scholar 

  8. Dahse, J.: A vulnerability scanner for different kinds of vulnerabilities. http://rips-scanner.sourceforge.net

  9. Newsome, J., Song, D.: Dynamic taint analysis for automatic dedection, analysis, and signature generation of exploits on commodity software. In: Network and Distributed System Security Symposium (NDSS) (2005)

    Google Scholar 

  10. Shar, L.K., Tan, H.B.K.: Auditing the defense against cross site scripting in web applications. In: Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT), pp. 1–7. IEEE (2010)

    Google Scholar 

  11. Sinha, S., Harrold, M.J., Rothermel, G.: Interprocedural control dependence. ACM Trans. Softw. Eng. Methodol. 10(2), 209–254 (2001)

    Article  Google Scholar 

  12. Chen, J.F., Wang, Y.D., Zhang, Y.Q., et al.: Automatic generation of attack vectors for stored-XSS. J. Grad. Univ. Chin. Acad. Sci. 29(6), 815–820 (2012)

    Google Scholar 

  13. Tarr, P.L., Wolf, A.L.: Engineering of Software: The Continuing Contributions of Leon J, p. 58. Osterweil. Springer, Heidelberg (2011). ISBN 978-3-642-19823

    Book  Google Scholar 

  14. WebGoat, OWASP WebGoat Project. https://www.owasp.org/index.php/Category

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fen Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Yan, F., Qiao, T. (2016). Study on the Detection of Cross-Site Scripting Vulnerabilities Based on Reverse Code Audit. In: Yin, H., et al. Intelligent Data Engineering and Automated Learning – IDEAL 2016. IDEAL 2016. Lecture Notes in Computer Science(), vol 9937. Springer, Cham. https://doi.org/10.1007/978-3-319-46257-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46257-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46256-1

  • Online ISBN: 978-3-319-46257-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics