UPM Institutional Repository

Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines


Hydara, Isatou and Md Sultan, Abu Bakar and Zulzalil, Hazura and Admodisastro, Novia Indriaty (2015) Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines. In: 4th International Conference on Computer Science and Computational Mathematics (ICCSCM 2015), 7-8 May 2015, Langkawi, Malaysia. (pp. 649-653).


Software security vulnerabilities are present in many web applications and have led to many successful attacks on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but difficult to eliminate. Most solutions provided only focus on preventing attacks or detecting the vulnerabilities. Very few research works have addressed eliminating these vulnerabilities from the web applications source codes. In this paper, we propose an approach to remove cross-site scripting vulnerabilities from the source code before an application is deployed. We make use of the OWASP cross-site scripting prevention rules as guideline in our approach. The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. Initial evaluation results have indicated promising results.

Download File

[img] Text
Restricted to Repository staff only

Download (506kB)

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Faculty of Computer Science and Information Technology
Publisher: Science and Knowledge Research Society
Keywords: Cross-site scripting; Software security; Vulnerability removal
Depositing User: Nabilah Mustapa
Date Deposited: 06 Mar 2019 05:35
Last Modified: 06 Mar 2019 05:35
URI: http://psasir.upm.edu.my/id/eprint/67003
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item