A taxonomy of XSS attack detections in mobile environments based on automation capabilities

Alexander Boyett, Atef Shalan, Hossain Shahriar, Muhammad Asadur Rahman

Research output: Contribution to book or proceedingConference articlepeer-review

Abstract

HTML and JavaScript have become the go-to languages for many developers making apps for multiple smartphone operating systems.HTML provides developers with a way to make a universal framework to build cross-platform apps. This convenience does not come without risk, however. Being HTML-based, these apps are susceptible to Cross-Site Scripting (XSS). In this paper, we break down what a cross-site scripting attack is, how it works, and the security risks that come with it. We also investigate several different methods used to detect and path code with vulnerability.

Original languageEnglish
Title of host publicationProceedings - 2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021
EditorsW. K. Chan, Bill Claycomb, Hiroki Takakura, Ji-Jiang Yang, Yuuichi Teranishi, Dave Towey, Sergio Segura, Hossain Shahriar, Sorel Reisman, Sheikh Iqbal Ahamed
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1339-1344
Number of pages6
ISBN (Electronic)9781665424639
DOIs
StatePublished - Jul 2021
Event45th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2021 - Virtual, Online, Spain
Duration: Jul 12 2021Jul 16 2021

Publication series

NameProceedings - 2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021

Conference

Conference45th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2021
Country/TerritorySpain
CityVirtual, Online
Period07/12/2107/16/21

Scopus Subject Areas

  • Artificial Intelligence
  • Computer Science Applications
  • Software

Keywords

  • Android system
  • Mobile applications
  • Secure software
  • XSS

Fingerprint

Dive into the research topics of 'A taxonomy of XSS attack detections in mobile environments based on automation capabilities'. Together they form a unique fingerprint.

Cite this