Please use this identifier to cite or link to this item:
http://dspace.univ-guelma.dz/jspui/handle/123456789/13042
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | GUELMI, ZAID | - |
dc.date.accessioned | 2022-10-11T12:04:08Z | - |
dc.date.available | 2022-10-11T12:04:08Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | http://dspace.univ-guelma.dz/jspui/handle/123456789/13042 | - |
dc.description.abstract | Cross-site scripting (XSS) is one of the most dangerous attacks menacing the navigation in the Web since its reveal in late 1999. Since then, several techniques have been developed in the aim to secure web applications against diverse types of XSS attacks. In this project, we contribute by designing a hybrid approach for the detection of web application vulnerabilities to XSS attacks. This way, vulnerable applications can be detected and hence updated to defend against XSS attacks. The hybrid approach combines static and dynamic analysis. While static analysis is used to detect of all the injection points included in individual pages through analyzing their contents, dynamic analysis is used to confirm the vulnerability of such points to XSS payload injection. A prototype named XSS Checker is developed in Node.js implementing the proposed approach. Conducted experiments, with the developed prototype, showed the ability of the proposed approach to detect vulnerabilities in real world applications. | en_US |
dc.language.iso | fr | en_US |
dc.publisher | université de guelma | en_US |
dc.subject | Détection des vulnérabilités, des applications Web , attaques XSS | en_US |
dc.title | Détection des vulnérabilités des applications Web aux attaques XSS | en_US |
dc.type | Working Paper | en_US |
Appears in Collections: | Master |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
GUELMI_ZAID_F5.pdf | 6,25 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.