A ROBUST DEFENCE AGAINST CONTENT-SNIFFING XSS ATTACKS

DC Field Value Language
dc.contributor.advisor이경석-
dc.contributor.authorTadesse, Misganaw-
dc.date.accessioned2018-11-08T07:59:39Z-
dc.date.available2018-11-08T07:59:39Z-
dc.date.issued2010-08-
dc.identifier.other10972-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/9533-
dc.description학위논문(석사)--아주대학교 일반대학원 :컴퓨터공학과,2010. 8-
dc.description.tableofcontents1.Introduction 1 1.1 Purpose of Research 2 1.2 Contents and Method of Research 4 2 Related Work 7 3 Attack Example 11 4 Proposed Scheme 16 5 Analysis of the Proposed Scheme 23 5.1 False Positive 23 5.2 False Negative 24 5.3 Time Overhead 25 6.Conclusion and future work 26-
dc.language.isoeng-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.titleA ROBUST DEFENCE AGAINST CONTENT-SNIFFING XSS ATTACKS-
dc.title.alternative콘텐츠 스니핑을 통한 크로스사이트 스크립팅 공격의 방어 기법-
dc.typeThesis-
dc.contributor.affiliation아주대학교 일반대학원-
dc.contributor.department일반대학원 컴퓨터공학과-
dc.date.awarded2010. 8-
dc.description.degreeMaster-
dc.identifier.localId568904-
dc.identifier.urlhttp://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000010972-
dc.subject.keywordComputer Engineering-
dc.description.alternativeAbstractMany Web sites such as MySpace, Facebook and Twitter allow their users to upload files. However when a Web sites Content- Sniffing algorithm differs from a browsers Content- Sniffing algorithm, an attacker can often mount a Content-Sniffing XSS attack on the visitor. That is, by carefully embedding HTML code containing malicious script into a non-HTML file and uploading this file to the Web site, an attacker can deceive the visitors browser into assuming the file as HTML file and run the script code. However Content- Sniffing XSS attack can be avoided if files uploaded on the server are checked for HTML codes. In this paper we implemented a server-side ingress filter that aims to protect vulnerable browsers which may treat non-HTML files as HTML files. Our filter examines user-uploaded files against a set of potentially dangerous HTML elements (a set of regular expressions). The results of our experiment show that our automata-based scheme is highly efficient and more accurate than existing signature-based approach.-
Appears in Collections:
Graduate School of Ajou University > Department of Computer Engineering > 3. Theses(Master)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse