References3
Smarty Template Engine: escape, http://www.smarty.net/manual/en/language.
modifier.escape.php
Stamm, S.: Content security policy (2009), https://wiki.mozilla.org/Security/
CSP/Spec
Swamy, N., Corcoran, B., Hicks, M.: Fable: A language for enforcing
user-defined security
policies.
In: Proceedings of the IEEE Symposium on Security and Privacy (May 2008)
Template::Manual::Filters, http://template-toolkit.org/docs/manual/Filters.
html
Mike, T.L., Venkatakrishnan, V.N.: BluePrint: Robust Prevention of Cross-site
Scripting Attacks
for
Existing Browsers. In: Proceedings of the IEEE Symposium on Security and
Privacy
(2009)
TwitPwn: DOM based XSS in Twitterfall (2009), http://www.twitpwn.com/2009/07/
motb-08-dom-based-xss-in-twitterfall.html
61.
Twitter: All about the “onMouseOver” incident, http://blog.twitter.com/2010/09/
all-about-onmouseover-incident.html
UTF-7 XSS Cheat Sheet, http://openmya.hacker.jp/hasegawa/security/utf7cs.
html
Venema, W.: Taint support for PHP (2007), ftp://ftp.porcupine.org/pub/php/
php-5.2.3-taint-20071103.README.html
170
J. Weinberger et al.
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross
site scripting
prevention
with dynamic data tainting and static analysis. In: Proceeding of the Network
and
Distributed
System Security Symposium (NDSS), vol. 42. Citeseer (2007)
Weinberger, J., Saxena, P., Akhawe, D., Finifter, M., Shin, R., Song, D.: An
empirical analysis
of
xss sanitization in web application frameworks. Tech. Rep. UCB/EECS-2011-11,
EECS
Department, University of California, Berkeley
(February 2011)
Xie, Y., Aiken, A.: Static detection of security vulnerabilities in scripting
languages. In:
Proceedings
of the Usenix Security Symposium (2006)
xssterminate, http://code.google.com/p/xssterminate/
Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: A practical
approach to
defeat
a wide range of attacks. In: Proceedings of the 15th USENIX Security Symposium,
pp.
121–136 (2006)
Yii Framework: Security, http://www.yiiframework.com/doc/guide/1.1/en/
topics.security
Zalewski, M.: Browser security handbook. Google Code (2010), http://code.google.
com/p/browsersec/wiki/Part1
Zend Framework: Zend Filter, http://framework.zend.com/manual/en/zend.
filter.set.html
.
jQuery, http://jquery.com/
.
Aas, G.: CPAN: URI::Escape, http://search.cpan.org/~gaas/URI-1.56/URI/
Escape.pm
.
Adsafe : Making javascript safe for advertising, http://www.adsafe.org/
.
How To: Prevent Cross-Site Scripting in ASP.NET, http://msdn.microsoft.com/
en-us/library/ff649310.aspx
.
Microsoft ASP.NET: Request Validation – Preventing Script Attacks, http://www.asp.
net/LEARN/whitepapers/request-validation
.
Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.,
Karagiannis, T.:
xJS:
practical XSS prevention for web application development. In: Proceedings of
the 2010
USENIX
Conference on Web Application Development (2010)
Balzarotti, D., Cova, M., Felmetsger, V., Jovanovic, N., Kirda, E., Kruegel,
C., Vigna, G.:
Saner:
Composing Static and Dynamic Analysis to Validate Sanitization in Web
Applications.
In:
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA
(2008)
.
Bandhakavi, S., King, S.T., Madhusudan, P., Winslett, M.: Vex: Vetting browser
extensions
for
security vulnerabilities (2010)
.
Baron, D.: Mozilla’s quirks mode, https://developer.mozilla.org/en/mozilla’s_
quirks_mode
.
Barth, A., Caballero, J., Song, D.: Secure content sniffing for web browsers or
how to stop
papers
from reviewing themselves. In: Proceedings of the 30th IEEE Symposium on
Security
and
Privacy, Oakland, CA (May 2009)
.
Barth, A., Felt, A.P., Saxena, P., Boodman, A.: Protecting browsers from
extension vulnerabilities
(2009)
.
Bates, D., Barth, A., Jackson, C.: Regular expressions considered harmful in
client-side xss
filters.
In: Proceedings of the 19th International Conference on World Wide Web, WWW
2010,
pp. 91–100. ACM, New York
(2010)
.
Bisht, P., Venkatakrishnan, V.: XSS-GUARD: precise dynamic prevention of
cross-site
scripting
attacks. In: Detection of Intrusions and Malware, and Vulnerability Assessment,
pp.
23–43 (2008)
Google-caja: A source-to-source translator for securing javascript-based web
content,
http://code.google.com/p/google-caja/
15.
CakePHP: Sanitize Class Info, http://api.cakephp.org/class/sanitize
16.
Chin, E., Wagner, D.: Efficient character-level taint tracking for java. In:
Proceedings of
the
2009 ACM Workshop on Secure Web Services, SWS 2009, pp. 3–12. ACM, New York
(2009) 168
J. Weinberger et al.
Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.:
Secure web applications
via
automatic partitioning. In: Proceedings of Twenty-First ACM SIGOPS Symposium
on
Operating Systems Principles, pp. 31–44. ACM, New York (2007)
.
ClearSilver: Template Filters, http://www.clearsilver.net/docs/man_filters.hdf
CodeIgniter/system/libraries/Security.php, http://bitbucket.org/ellislab/
codeigniter/src/tip/system/libraries/Security.php
CodeIgniter User Guide Version 1.7.2: Input Class, http://codeigniter.com/user_
guide/libraries/input.html
Ctemplate: Guide to Using Auto Escape, http://google-ctemplate.googlecode.com/
svn/trunk/doc/auto_escape.html
django: Built-in template tags and filters, http://docs.djangoproject.com/en/dev/
ref/templates/builtins
Django sites : Websites powered by django, http://www.djangosites.org/
The Django Book: Security, http://www.djangobook.com/en/2.0/chapter20/
Finifter,M.,Wagner, D.: Exploring the Relationship BetweenWeb Application
Development
Tools
and Security. In: Proceedings of the 2nd USENIX Conference on Web Application
Development.
USENIX (June 2011)
Finifter, M., Weinberger, J., Barth, A.: Preventing capability leaks in secure
javascript subsets.
In:
Proc. of Network and Distributed System Security Symposium (2010)
Guha, A., Krishnamurthi, S., Jim, T.: Using static analysis for ajax intrusion detection.
In:
Proceedings
of the 18th International Conference on World Wide Web, WWW 2009, pp.
561–570.
ACM, New York
(2009)
Google Web Toolkit: Developer’s Guide – SafeHtml, http://code.google.com/
webtoolkit/doc/latest/DevGuideSecuritySafeHtml.html
Hansen, R.: XSS cheat sheet (2008)
Hickson, I.: HTML 5 : A vocabulary and
associated apis for html and xhtml, http://www.
w3.org/TR/html5/
HTML Purifier Team: Css quoting full disclosure (2010), http://htmlpurifier.org/
security/2010/css-quoting
HTML Purifier : Standards-Compliant HTML Filtering, http://htmlpurifier.org/
Huang, Y.W., Yu, F., Hang, C., Tsai, C.H., Lee, D.T., Kuo, S.Y.: Securing web
application
code
by static analysis and runtime protection. In: Proceedings of the 13th
International
Conference
on World Wide Web, WWW2004, pp. 40–52. ACM, New York (2004)
Jean, J.: Facebook CSRF and XSS vulnerabilities: Destructive worms on a social
network,
http://seclists.org/fulldisclosure/2010/Oct/35
JiftyManual, http://jifty.org/view/JiftyManual
Jovanovic, N., Kr¨ugel, C., Kirda, E.: Pixy: A static analysis tool for detecting
web application
vulnerabilities
(short paper). In: IEEE Symposium on Security and Privacy (2006)
Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution
for mitigating
cross-site
scripting attacks. In: Proceedings of the 2006 ACM Symposium on Applied
Computing,
pp. 330–337. ACM, New York
(2006)
KSES Developer Team: Kses php html/xhtml filter, http://sourceforge.net/
projects/kses/
Livshits, B., Lam, M.S.: Finding security errors in Java programs with static
analysis. In:
Proceedings
of the Usenix Security Symposium (2005)
Livshits, B., Martin, M., Lam, M.S.: SecuriFly: Runtime protection and recovery
from Web
application
vulnerabilities. Tech. rep., Stanford
University (September
2006)
Martin, M., Lam, M.S.: Automatic generation of XSS and SQL injection attacks
with goaldirected
model
checking. In: 17th USENIX Security Symposium (2008)
The Mason Book: Escaping Substitutions, http://www.masonbook.com/book/
chapter-2.mhtml
A
Systematic Analysis of XSS Sanitization in Web Application Frameworks 169
Nadji, Y., Saxena, P., Song, D.: Document structure integrity: A robust basis
for cross-site
scripting
defense. In: NDSS (2009)
Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.:
Automatically hardening
web
applications using precise tainting. In: 20th IFIP International Information
Security
Conference
(2005)
XSS Prevention Cheat Sheet, http://www.owasp.org/index.php/XSS_(Cross_Site_
Scripting)_Prevention_Cheat_Sheet
Pullicino, J.: Google XSS Flaw in Website Optimizer Explained (December
2010),
http://www.acunetix.com/blog/web-security-zone/articles/
google-xss-website-optimizer-scripts/
Robertson, W., Vigna, G.: Static enforcement of web application integrity
through strong
typing.
In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM
2009,
pp. 283–298. USENIX Association, Berkeley
(2009)
Ruby on Rails Security Guide, http://guides.rubyonrails.org/security.html
Saxena, P., Akhawe, D., Hanna, S., Mao, F., McCamant, S., Song, D.: A symbolic
execution
framework
for javascript. In: Proceedings of the 2010 IEEE Symposium on Security and
Privacy,
SP 2010, pp. 513–528. IEEE Computer Society, Washington, DC, USA (2010)
Saxena, P., Hanna, S., Poosankam, P., Song, D.: FLAX: Systematic discovery of
client-side
validation
vulnerabilities in rich web applications. In: 17th Annual Network &
Distributed
System
Security Symposium NDSS (2010)
Saxena, P., Molnar, D., Livshits, B.: Scriptgard: Preventing script injection
attacks in legacy
web
applications with automatic sanitization. Tech. rep., Microsoft Research
(September
2010)
Schmidt, B.: Google Analytics XSS Vulnerability, http://spareclockcycles.org/
2011/02/03/google-analytics-xss-vulnerability/
Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about
dynamic taint
analysis
and forward symbolic execution (but might have been afraid to ask). In:
Proceedings
of
the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 317–331. IEEE
Computer
Society, Washington, DC, USA
(2010)
Seo, J., Lam, M.S.: Invisitype: Object-oriented security policies (2010)
No comments:
Post a Comment