Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2414456.2414462acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications

Published: 02 May 2012 Publication History

Abstract

The last fifteen years have transformed the Web in ways that would seem unimaginable to anyone of the "few" Internet users of the year 1995 [8]. What began as a simple set of protocols and mechanisms facilitating the exchange of static documents between remote computers is now an everyday part of billions' of users life, technical and non-technical alike. The sum of a user's daily experience is composed of open standards, such as HTML, JavaScript and Cascading Style Sheets as well as proprietary plugins, such as Adobe's Flash [1] and Microsoft's Silverlight [6].

References

[1]
Flash Player | Adobe Flash Player 11 | Overview. http://www.adobe.com/products/flashplayer.html.
[2]
M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda. Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks. In Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '09, pages 88--106, Berlin, Heidelberg, 2009. Springer-Verlag.
[3]
Pc penetration | statistics | adobe flash platform runtimes. http://www.adobe.com/products/flashplatformruntimes/statistics.html.
[4]
HTML5. http://dev.w3.org/html5/spec/Overview.html.
[5]
JoMo-kun. m0j0.j0j0 Guide to IIS Hacking. http://www.foofus.net/~jmk/iis.html.
[6]
Microsoft Silverlight. http://www.microsoft.com/silverlight/.
[7]
Rich internet application (ria) market share. http://www.statowl.com/custom_ria_market_penetration.php.
[8]
C. Stoll. The internet? bah! http://www.thedailybeast.com/newsweek/1995/02/26/the-internet-bah.html, 1995.
[9]
The Cross-site Scripting FAQ. http://www.cgisecurity.com/xss-faq.html.

Cited By

View all
  • (2024)Twenty-two years since revealing cross-site scripting attacksComputer Science Review10.1016/j.cosrev.2024.10063452:COnline publication date: 18-Jul-2024
  • (2022)HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property GraphsProceedings of the ACM Web Conference 202210.1145/3485447.3512235(755-766)Online publication date: 25-Apr-2022
  • (2022)Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement LearningProceedings of the ACM Web Conference 202210.1145/3485447.3512234(743-754)Online publication date: 25-Apr-2022
  • Show More Cited By

Index Terms

  1. FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          ASIACCS '12: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
          May 2012
          119 pages
          ISBN:9781450316484
          DOI:10.1145/2414456
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 02 May 2012

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article

          Conference

          ASIA CCS '12
          Sponsor:

          Acceptance Rates

          Overall Acceptance Rate 418 of 2,322 submissions, 18%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)5
          • Downloads (Last 6 weeks)2
          Reflects downloads up to 29 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Twenty-two years since revealing cross-site scripting attacksComputer Science Review10.1016/j.cosrev.2024.10063452:COnline publication date: 18-Jul-2024
          • (2022)HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property GraphsProceedings of the ACM Web Conference 202210.1145/3485447.3512235(755-766)Online publication date: 25-Apr-2022
          • (2022)Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement LearningProceedings of the ACM Web Conference 202210.1145/3485447.3512234(743-754)Online publication date: 25-Apr-2022
          • (2022)Digital Transformation Security ChallengesJournal of Computer Information Systems10.1080/08874417.2022.211595363:4(919-936)Online publication date: 7-Sep-2022
          • (2019)SEC‐H5: Secure and efficient integration of settings of enhanced HTML5 XSS vector defensive framework on edge network of fog nodesConcurrency and Computation: Practice and Experience10.1002/cpe.518831:17Online publication date: 17-Feb-2019
          • (2018)Plague of cross-site scripting on web applicationsInternational Journal of Web Based Communities10.5555/3212445.321245014:1(64-93)Online publication date: 21-Dec-2018
          • (2018)Large-Scale Analysis of Style Injection by Relative Path OverwriteProceedings of the 2018 World Wide Web Conference10.1145/3178876.3186090(237-246)Online publication date: 10-Apr-2018
          • (2018)Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directionsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-018-1118-3Online publication date: 8-Nov-2018
          • (2018)The Ontology of MalwaresPractical Information Security10.1007/978-3-319-72119-4_2(17-52)Online publication date: 31-Jan-2018
          • (2018)A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social networkConcurrency and Computation: Practice and Experience10.1002/cpe.464631:21Online publication date: 31-May-2018
          • Show More Cited By

          View Options

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media