[1] Wichers D. The top 10 most critical web application security risks . The Open Web Application Security Project (OWASP), 2010.
[2] Kirda E, Vigna G, Jovanovic N. Noxes: a client-side solution for mitigating cross-site scripting attacks //The 21st Annual ACM Symposium on Applied Computing. New York, USA: ACM, 2006: 330-337.
[3] Kirda E, Kruegel C, Virgac G. Client-side cross-site scripting protection [J]. Computers and Security, 2009, 28(7): 592-604.
[4] Livshits B, Cui W. Spectator: detection and containment of JavaScript worms //USENIX 2008 Annual Technical Conference on Annual Technical Conference. Boston, USA: ACM, 2008: 335-348.
[5] Sun F, Xu L, Su Z. Client-side detection of XSS worms by monitoring payload propagation //Proceedings of the 14th European Conference on Research in Computer Security. Saint-Malo, France: ACM, 2009: 539-554.
[6] Fogie S, Hansen R, Rager A, et al. XSS attacks: cross site scripting exploits and defense [M]. New York: Syngress Media, 2007.
[7] Garcia J, Navarro G. A survey on cross-site scripting attacks: USA, abs/0905.4850 . (2009-05-29) http://arxiv.org/pdf/0905.4850v1.
[8] Faghani M, Saidi H. Social networks’ XSS worms //International Conference on Computational Science and Engineering. Vancouver, Canada: IEEE Computer Society, 2009: 1137-1141.
[9] Dabirsiaghi A. Building and stopping next generation XSS worms //3rd International OWASP Symposium on Web Application Security. Ghent, Belguim, 2008.
[10] Network Working Group. HTTP methods: USA, internet RFC 2616 . (2004-09-01) http://www.w3.org/Protocols/rfc2616/rfc2616.html.
[11] Oda T, Oorschot P, Somayaji A. SOMA: mutual approval for included content in web pages [J]. ACM Computer and Communications Security, 2008:89-98.
[12] Vogt P. Cross site scripting (XSS) attack prevention with dynamic data tainting on the client side . Vienna: Technical University of Vienna, 2006.
|