研究生: |
吳俊霖 Wu, Chun-Lin |
---|---|
論文名稱: |
一個用於檢測以DOM為基礎的跨網站腳本漏洞系統 A Static Analysis System for Detecting DOM-Based XSS Posed on HTML5 Web Applications |
指導教授: |
孫宏民
Sun, Hung-Min |
口試委員: |
曾文貴
Tzeng, Wen-Guey 顏嵩銘 Yen, Sung-Ming |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊系統與應用研究所 Institute of Information Systems and Applications |
論文出版年: | 2017 |
畢業學年度: | 105 |
語文別: | 英文 |
論文頁數: | 45 |
中文關鍵詞: | HTML5網頁 、跨網站腳本漏洞 、靜態檢測 、文件物件模型 |
外文關鍵詞: | HTML5, XSS, Static-Analysis, DOM |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路科技越來越進步,網頁開始擁有比以前更多的功能,使用者現在甚 至可以利用手機網頁去做很多事情,例如:利用電子商務網站購買商品、訂車 票、查詢所要的地點等等。因此,使用者的隱私安全會更顯重要,使用者無法偵 測應用程式何時搜集他們的個人資料,在瀏覽網頁途中就可能被攻擊者竊取敏感 的資料,例如帳號密碼、地理位置等等。 在本篇論文中,我們介紹了新的網 頁技術–HTML5,HTML5 是現代網頁中常常會用到的技術,它將許多以往需要 在伺服器實作的技術移轉到使用者端,這會讓開發者更方便開發網頁,但也可能 造成致命的 DOM-Based XSS 攻擊,我們在這篇論文列出了許多 HTML5 可能造 成的 DOM-Based XSS 攻擊方式,並且提出一套用於偵測 HTML5 網頁是否暴露 於 DOM-Based XSS 威脅的檢測系統,以期能夠降低 DOM-Based XSS 攻擊的影 響。
With the evolution of the Internet technology, there are more and more functions in web applications. Even users can do lots of things via web applications on the smart phones. For example, buying some stu s on the e-commerce websites, booking train tickets, search the locations, and so on. As a result, user’s privacy is getting more and more important, the attackers may steal the sensitive data when the users type their information. For instance, stealing the user’s account number and password, watching the user’s location.
In this paper, we introduce a new web technology called HTML5. HTML5 is a common used technology in the modern web applications. It moves a large number of functions which used to implement on the server side to the client side. That makes developers can develop web applications easily. However, it may also su er from new methods of DOM-Based XSS attacks. We list a lot of HTML5 DOM- Based XSS vectors in this paper. In addition, we propose a System for Detecting DOM-Based XSS Posed on HTML5 web applications.
[1] Owasp: Cross site scripting. https://www.slideshare.net/m1ke/ owasp-a3-xss.
[2] Soojin Yoon, JongHun Jung, and HwanKuk Kim. Attacks on web browsers with html5. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for, pages 193–197. IEEE, 2015.
[3] The html dom. https://www.w3schools.com/js/js_htmldom.asp.
[4] Html event attributes. https://www.w3schools.com/tags/ref_
eventattributes.asp.
[5] Html5onresizeevent.https://www.w3schools.com/jsref/event_onresize.
asp.
[6] Html5 oninput event. https://www.w3schools.com/jsref/event_oninput.
asp.
[7] Html5 drag and drop api. https://www.w3schools.com/html/html5_
draganddrop.asp.
[8] Html5 oncanplay event. https://www.w3schools.com/jsref/event_
oncanplay.asp.
[9] Html5 ontoggle event. https://www.w3schools.com/jsref/event_ ontoggle.asp.
[10] Html5 geolocation api. https://www.w3schools.com/html/html5_geolocation.asp.
[11] Html5 webstorage api. https://www.w3schools.com/html/html5_webstorage.asp.
[12] Html5 postmessage api. http://xyz.cinc.biz/2014/05/html5-postmessage-text.html.
[13] Html5 websql xss attack. http://www.andlabs.org/html5/csXSS1.html.
[14] Svg (scalable vector graphics). https://www.w3schools.com/graphics/svg_
intro.asp.
[15] Amit Klein. Dom based cross site scripting or xss of the third kind. http://
www. webappsec. org/projects/articles/071105. shtml, 2005.
[16] Prabhu Seshagiri, Anu Vazhayil, and Padmamala Sriram. Ama: Static code analysis of web page for the detection of malicious scripts. Procedia Computer Science, 93:768–773, 2016.
[17] Shukai Liu, Xuexiong Yan, Qingxian Wang, Xu Zhao, Chuansen Chai, and Yajing Sun. A protection mechanism against malicious html and javascript code in vulnerable web applications. Mathematical Problems in Engineering, 2016, 2016.
[18] Npm (node package manager). https://www.npmjs.com.
[19] The crawler module. https://www.npmjs.com/package/crawler.
[20] The yargs module. http://yargs.js.org.
[21] The express module. https://expressjs.com.
[22] Daniel Hedin and Andrei Sabelfeld. Web application security using js ow. In
Symbolic and Numeric Algorithms for Scienti c Computing (SYNASC), 2015 17th International Symposium on, pages 16–19. IEEE, 2015.
[23] W3school.com. https://www.w3schools.com.
[24] The x-xss-protection header. https://developer.mozilla.org/en-US/docs/
Web/HTTP/Headers/X-XSS-Protection.
[25] Hsts (http strict-transport-security). https://developer.mozilla.org/
en-US/docs/Web/HTTP/Headers/Strict-Transport-Security.
[26] Csp (content security policy). https://developer.mozilla.org/en-US/ docs/Web/HTTP/CSP.