Publication Type : Book Chapter
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.
Source : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, Springer India, New Delhi, p.215–223 (2016)
Url : http://dx.doi.org/10.1007/978-81-322-2517-1_22
ISBN : 9788132225171
Keywords : Augmented browser, Dead code injection, Mutation cross-site scripting
Campus : Coimbatore
School : School of Engineering, Centre for Cybersecurity Systems and Networks
Center : TIFAC CORE in Cyber Security
Department : cyber Security
Year : 2016
Abstract : Browser extensions have a great role in bringing changes to the web browser behavior and improving browser performance. However, nowadays, many browser extensions fail to meet the security requirements. Due to this, they become a medium for various attackers to steal the credential information of the users. The proposal in this paper makes a pitch for the protection of an augmented browser extension against mutation-based cross-site scripting attack. A method is introduced for hardening the browser extension script along with dead code injection. A mutation-based cross-site scripting identifier to identify the attacks that affect the extensions is also discussed in this paper. These methods will protect browser extensions from various malicious script injection attacks.
Cite this Research Publication : S. Remya and Praveen, K., “Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, C. Suresh Satapathy, Raju, S. K., Mandal, K. Jyotsna, and Bhateja, V., Eds. New Delhi: Springer India, 2016, pp. 215–223.