UPM Institutional Repository

Automatic generation of content security policy to mitigate cross site scripting


Citation

Mhana, Samer Attallah and Din, Jamilah and Atan, Rodziah (2016) Automatic generation of content security policy to mitigate cross site scripting. In: 2016 2nd International Conference on Science in Information Technology (ICSITech), 26-27 Oct. 2016, Balikpapan, Indonesia. (pp. 324-328).

Abstract

Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). However, utilizing CSP by site administrators is a fallible process and may require significant changes in web application code. In this paper, we propose an approach to help site administers to overcome these limitations in order to utilize the full benefits of CSP mechanism which leads to more immune sites from XSS. The algorithm is implemented as a plugin. It does not interfere with the web application original code. The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.


Download File

[img]
Preview
PDF (Abstract)
Automatic generation of content security policy to mitigate cross site scripting.pdf

Download (34kB) | Preview

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.1109/ICSITech.2016.7852656
Publisher: IEEE
Keywords: CSP; Security; XSS
Depositing User: Nabilah Mustapa
Date Deposited: 03 Jul 2017 09:28
Last Modified: 03 Jul 2017 09:28
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.1109/ICSITech.2016.7852656
URI: http://psasir.upm.edu.my/id/eprint/56016
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item