Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks
by Shashank Gupta; B.B. Gupta
International Journal of Information and Computer Security (IJICS), Vol. 10, No. 2/3, 2018

Abstract: The authors introduced a universal and an automated server-side flexible framework, XSS-explorer, which automatically scrutinises the web applications in order to discover XSS attack vectors. XSS-explorer is capable enough for exploring and recognising all the injection points of web application and produces explicit XSS attack injection investigations for all such injection points. Our approach is based on methods permitting precise filling of injection points of forms with usable info. The identification of such injection points permits our technique to retrieve each possible web page of application, allowing a wider exploration and accelerating the discovery frequency of XSS attack vectors. We evaluate efficiency of our scheme on a suite of open source multimedia applications by applying F-test hypothesis and F-measure. These evaluations indorse that precise filling of the injection points by only usable info confirms an enhanced efficiency of the tests, thus accelerating the recognition rate of XSS attacks.

Online publication date: Tue, 01-May-2018

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?

Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email