Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
Software security vulnerabilities are present in many web applications and have led to many successful attacks on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but difficu...
| Main Authors: | Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Indian Society for Education and Environment
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/55151/ http://psasir.upm.edu.my/id/eprint/55151/1/Removing%20cross-site%20scripting%20vulnerabilities%20from%20web%20applications%20using%20the%20OWASP%20ESAPI%20security%20guidelines.pdf |
Similar Items
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Developing a secure web application using OWASP guidelines.
by: Sedek, Khairul Anwar, et al.
Published: (2009)
by: Sedek, Khairul Anwar, et al.
Published: (2009)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Automatic generation of content security policy to mitigate cross site scripting
by: Mhana, Samer Attallah, et al.
Published: (2016)
by: Mhana, Samer Attallah, et al.
Published: (2016)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
A Code generator tool for the gamma design patterns / Novia Indriaty Admodisastro
by: Novia Indriaty, Admodisastro
Published: (2003)
by: Novia Indriaty, Admodisastro
Published: (2003)
A dynamic reconfiguration model of web services in service-oriented architecture
by: Ilahi, Rahmat, et al.
Published: (2017)
by: Ilahi, Rahmat, et al.
Published: (2017)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Design guidelines of tangible interaction learning model for children with dyslexia
by: Admodisastro, Novia Indriaty, et al.
Published: (2019)
by: Admodisastro, Novia Indriaty, et al.
Published: (2019)
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML : a process-pluggable ADL for supporting architectural analysis in component-based systems.
by: Admodisastro, Novia Indriaty, et al.
by: Admodisastro, Novia Indriaty, et al.
Usability requirements for architectural analysis tool to support CBD
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML: a process-pluggable ADL for supporting architectural analysis in component-based systems
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
A code generator tool for the gamma design patterns
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
Home (Script)
by: Brown Ash, M., et al.
Published: (2015)
by: Brown Ash, M., et al.
Published: (2015)
Deriving objective navigational measures for web usability
by: Rahmat, Hazwani, et al.
Published: (2013)
by: Rahmat, Hazwani, et al.
Published: (2013)
Similar Items
-
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015) -
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022) -
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)