• English
    • français
  • Help
  •  | 
  • Contact
  •  | 
  • About
  •  | 
  • Login
  • HAL portal
  •  | 
  • Pages Pro
  • EN
  •  / 
  • FR
View Item 
  •   LillOA Home
  • Liste des unités
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
  • View Item
  •   LillOA Home
  • Liste des unités
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Empirical Investigation of the Web Browser ...
  • BibTeX
  • CSV
  • Excel
  • RIS

Document type :
Communication dans un congrès avec actes
DOI :
10.1109/ICSTW.2014.63
Title :
Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: an Urgent Need for Systematic Security Regression Testing
Author(s) :
Abgrall, Erwan [Auteur]
Objets communicants pour l'Internet du futur [OCIF]
Gombault, Sylvain [Auteur]
Objets communicants pour l'Internet du futur [OCIF]
Le Traon, Yves [Auteur]
Monperrus, Martin [Auteur]
Université de Lille, Sciences et Technologies
Self-adaptation for distributed services and large software systems [SPIRALS]
Conference title :
International Conference on Software Testing, Verification and Validation Workshops
City :
Cleveland
Country :
Etats-Unis d'Amérique
Start date of the conference :
2014
Publication date :
2014
HAL domain(s) :
Informatique [cs]/Génie logiciel [cs.SE]
English abstract : [en]
One of the major threats against web applications is Cross-Site Scripting (XSS). The final target of XSS attacks is the client running a particular web browser. During this last decade, several competing web browsers (IE, ...
Show more >
One of the major threats against web applications is Cross-Site Scripting (XSS). The final target of XSS attacks is the client running a particular web browser. During this last decade, several competing web browsers (IE, Netscape, Chrome, Firefox) have evolved to support new features. In this paper, we explore whether the evolution of web browsers is done using systematic security regression testing. Beginning with an analysis of their current exposure degree to XSS, we extend the empirical study to a decade of most popular web browser versions. We use XSS attack vectors as unit test cases and we propose a new method supported by a tool to address this XSS vector testing issue. The analysis on a decade releases of most popular web browsers including mobile ones shows an urgent need of XSS regression testing. We advocate the use of a shared security testing benchmark as a good practice and propose a first set of publicly available XSS vectors as a basis to ensure that security is not sacrificed when a new version is delivered.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
Source :
Harvested from HAL
Files
Thumbnail
  • https://hal.archives-ouvertes.fr/hal-00979586/document
  • Open access
  • Access the document
Thumbnail
  • http://orbilu.uni.lu/bitstream/10993/26528/1/empirical%20investigation.pdf
  • Open access
  • Access the document
Thumbnail
  • https://hal.archives-ouvertes.fr/hal-00979586/document
  • Open access
  • Access the document
Université de Lille

Mentions légales
Université de Lille © 2017