Back close

Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Publication Type : Book Chapter

Thematic Areas : TIFAC-CORE in Cyber Security

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Source : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, Springer India, New Delhi, p.215–223 (2016)

Url : http://dx.doi.org/10.1007/978-81-322-2517-1_22

ISBN : 9788132225171

Keywords : Augmented browser, Dead code injection, Mutation cross-site scripting

Campus : Coimbatore

School : School of Engineering, Centre for Cybersecurity Systems and Networks

Center : TIFAC CORE in Cyber Security

Department : cyber Security

Year : 2016

Abstract : Browser extensions have a great role in bringing changes to the web browser behavior and improving browser performance. However, nowadays, many browser extensions fail to meet the security requirements. Due to this, they become a medium for various attackers to steal the credential information of the users. The proposal in this paper makes a pitch for the protection of an augmented browser extension against mutation-based cross-site scripting attack. A method is introduced for hardening the browser extension script along with dead code injection. A mutation-based cross-site scripting identifier to identify the attacks that affect the extensions is also discussed in this paper. These methods will protect browser extensions from various malicious script injection attacks.

Cite this Research Publication : S. Remya and Praveen, K., “Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, C. Suresh Satapathy, Raju, S. K., Mandal, K. Jyotsna, and Bhateja, V., Eds. New Delhi: Springer India, 2016, pp. 215–223.

Admissions Apply Now