Abstract | ||
---|---|---|
JavaScript injection is inserting unwanted JavaScript into Web pages with the intent on violating the security and privacy standards of the Web pages. There are a number of techniques that have been developed for the detection and prevention of JavaScript injection, and all have performance costs. While the performance issues of the JavaScript injection detection techniques have been mainly studied in running systems, we propose a simulation approach using UML SPT and JavaSim. The new approach not only reduces the cost for such analysis but also provides a framework for modeling injection detection techniques and analyzing the performance implications of design decisions. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/EIT.2014.6871752 | Electro/Information Technology |
Keywords | Field | DocType |
Java,security of data,JavaScript injection detection techniques,JavaSim,UML SPT,Web pages,privacy standards,security standards,Computer Security,Intrusion Detection,JavaScript,performance analysis | Browser security,Web page,Computer science,Unobtrusive JavaScript,Web application security,Cross-site scripting,Operating system,Rich Internet application,Content Security Policy,JavaScript | Conference |
ISSN | Citations | PageRank |
2154-0357 | 1 | 0.38 |
References | Authors | |
12 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
David Larson | 1 | 5 | 1.90 |
Jigang Liu | 2 | 1 | 0.38 |
Yanjun Zuo | 3 | 1 | 0.38 |