Loading…

A Source Code Cross-site Scripting Vulnerability Detection Method

To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the so...

Full description

Saved in:
Bibliographic Details
Published in:KSII transactions on Internet and information systems 2023-06, Vol.17 (6), p.1689-1705
Main Authors: Mu Chen, Lu Chen, Zhipeng Shao, Zaojian Dai, Nige Li, Xingjie Huang, Qian Dang, Xinjian Zhao
Format: Article
Language:Korean
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1705
container_issue 6
container_start_page 1689
container_title KSII transactions on Internet and information systems
container_volume 17
creator Mu Chen
Lu Chen
Zhipeng Shao
Zaojian Dai
Nige Li
Xingjie Huang
Qian Dang
Xinjian Zhao
description To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: “white-box testing” and “black-box testing”. Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network
format article
fullrecord <record><control><sourceid>kiss_kisti</sourceid><recordid>TN_cdi_kisti_ndsl_JAKO202321337600340</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><kiss_id>4032626</kiss_id><sourcerecordid>4032626</sourcerecordid><originalsourceid>FETCH-LOGICAL-k500-a6b26b6a1500bce57ebd6141dd1d98e73b8b4d116815b3d93eed5f672fd80f993</originalsourceid><addsrcrecordid>eNpNjEtLw0AUhQdRsNT-AjezcRmYR3JnsgzxWStdtLgNmdwbHRqTMjNd9N8bUMTNeXA-zgVbyNJAZpQxl__yNVvF6J2QyirIrV2wquK76RQ64vWEs4Qpxiz6RHzXBX9Mfvzg76dhpNA6P_h05veUqEt-Gvkbpc8Jb9hV3w6RVr--ZPvHh339nG22Ty91tckOhRBZC06Bg1bOxXVUGHIIMpeIEktLRjvrcpQSrCycxlITYdGDUT1a0ZelXrK7n9uDj8k3I8ahWVevWyWUVlJrA0LoXMzc7R8Xm2PwX204N_OgQIH-BshTTuc</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A Source Code Cross-site Scripting Vulnerability Detection Method</title><source>EZB Electronic Journals Library</source><creator>Mu Chen ; Lu Chen ; Zhipeng Shao ; Zaojian Dai ; Nige Li ; Xingjie Huang ; Qian Dang ; Xinjian Zhao</creator><creatorcontrib>Mu Chen ; Lu Chen ; Zhipeng Shao ; Zaojian Dai ; Nige Li ; Xingjie Huang ; Qian Dang ; Xinjian Zhao</creatorcontrib><description>To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: “white-box testing” and “black-box testing”. Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network</description><identifier>ISSN: 1976-7277</identifier><identifier>EISSN: 1976-7277</identifier><language>kor</language><publisher>한국인터넷정보학회</publisher><subject>cross-site scripting ; Dynamic testing ; Static analysis ; vulnerability ; Vulnerability detection ; Webpage attack simulation ; XSS</subject><ispartof>KSII transactions on Internet and information systems, 2023-06, Vol.17 (6), p.1689-1705</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,314,780,784,885</link.rule.ids></links><search><creatorcontrib>Mu Chen</creatorcontrib><creatorcontrib>Lu Chen</creatorcontrib><creatorcontrib>Zhipeng Shao</creatorcontrib><creatorcontrib>Zaojian Dai</creatorcontrib><creatorcontrib>Nige Li</creatorcontrib><creatorcontrib>Xingjie Huang</creatorcontrib><creatorcontrib>Qian Dang</creatorcontrib><creatorcontrib>Xinjian Zhao</creatorcontrib><title>A Source Code Cross-site Scripting Vulnerability Detection Method</title><title>KSII transactions on Internet and information systems</title><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><description>To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: “white-box testing” and “black-box testing”. Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network</description><subject>cross-site scripting</subject><subject>Dynamic testing</subject><subject>Static analysis</subject><subject>vulnerability</subject><subject>Vulnerability detection</subject><subject>Webpage attack simulation</subject><subject>XSS</subject><issn>1976-7277</issn><issn>1976-7277</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNpNjEtLw0AUhQdRsNT-AjezcRmYR3JnsgzxWStdtLgNmdwbHRqTMjNd9N8bUMTNeXA-zgVbyNJAZpQxl__yNVvF6J2QyirIrV2wquK76RQ64vWEs4Qpxiz6RHzXBX9Mfvzg76dhpNA6P_h05veUqEt-Gvkbpc8Jb9hV3w6RVr--ZPvHh339nG22Ty91tckOhRBZC06Bg1bOxXVUGHIIMpeIEktLRjvrcpQSrCycxlITYdGDUT1a0ZelXrK7n9uDj8k3I8ahWVevWyWUVlJrA0LoXMzc7R8Xm2PwX204N_OgQIH-BshTTuc</recordid><startdate>20230630</startdate><enddate>20230630</enddate><creator>Mu Chen</creator><creator>Lu Chen</creator><creator>Zhipeng Shao</creator><creator>Zaojian Dai</creator><creator>Nige Li</creator><creator>Xingjie Huang</creator><creator>Qian Dang</creator><creator>Xinjian Zhao</creator><general>한국인터넷정보학회</general><scope>HZB</scope><scope>Q5X</scope><scope>JDI</scope></search><sort><creationdate>20230630</creationdate><title>A Source Code Cross-site Scripting Vulnerability Detection Method</title><author>Mu Chen ; Lu Chen ; Zhipeng Shao ; Zaojian Dai ; Nige Li ; Xingjie Huang ; Qian Dang ; Xinjian Zhao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-k500-a6b26b6a1500bce57ebd6141dd1d98e73b8b4d116815b3d93eed5f672fd80f993</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>kor</language><creationdate>2023</creationdate><topic>cross-site scripting</topic><topic>Dynamic testing</topic><topic>Static analysis</topic><topic>vulnerability</topic><topic>Vulnerability detection</topic><topic>Webpage attack simulation</topic><topic>XSS</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mu Chen</creatorcontrib><creatorcontrib>Lu Chen</creatorcontrib><creatorcontrib>Zhipeng Shao</creatorcontrib><creatorcontrib>Zaojian Dai</creatorcontrib><creatorcontrib>Nige Li</creatorcontrib><creatorcontrib>Xingjie Huang</creatorcontrib><creatorcontrib>Qian Dang</creatorcontrib><creatorcontrib>Xinjian Zhao</creatorcontrib><collection>KISS</collection><collection>Korean Studies Information Service System (KISS) B-Type</collection><collection>KoreaScience</collection><jtitle>KSII transactions on Internet and information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mu Chen</au><au>Lu Chen</au><au>Zhipeng Shao</au><au>Zaojian Dai</au><au>Nige Li</au><au>Xingjie Huang</au><au>Qian Dang</au><au>Xinjian Zhao</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Source Code Cross-site Scripting Vulnerability Detection Method</atitle><jtitle>KSII transactions on Internet and information systems</jtitle><addtitle>KSII Transactions on Internet and Information Systems (TIIS)</addtitle><date>2023-06-30</date><risdate>2023</risdate><volume>17</volume><issue>6</issue><spage>1689</spage><epage>1705</epage><pages>1689-1705</pages><issn>1976-7277</issn><eissn>1976-7277</eissn><abstract>To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: “white-box testing” and “black-box testing”. Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network</abstract><pub>한국인터넷정보학회</pub><tpages>17</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1976-7277
ispartof KSII transactions on Internet and information systems, 2023-06, Vol.17 (6), p.1689-1705
issn 1976-7277
1976-7277
language kor
recordid cdi_kisti_ndsl_JAKO202321337600340
source EZB Electronic Journals Library
subjects cross-site scripting
Dynamic testing
Static analysis
vulnerability
Vulnerability detection
Webpage attack simulation
XSS
title A Source Code Cross-site Scripting Vulnerability Detection Method
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T03%3A09%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kiss_kisti&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Source%20Code%20Cross-site%20Scripting%20Vulnerability%20Detection%20Method&rft.jtitle=KSII%20transactions%20on%20Internet%20and%20information%20systems&rft.au=Mu%20Chen&rft.date=2023-06-30&rft.volume=17&rft.issue=6&rft.spage=1689&rft.epage=1705&rft.pages=1689-1705&rft.issn=1976-7277&rft.eissn=1976-7277&rft_id=info:doi/&rft_dat=%3Ckiss_kisti%3E4032626%3C/kiss_kisti%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-k500-a6b26b6a1500bce57ebd6141dd1d98e73b8b4d116815b3d93eed5f672fd80f993%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_kiss_id=4032626&rfr_iscdi=true