Vis enkel innførsel

dc.contributor.authorVikne, Andreas Svardal
dc.date.accessioned2019-05-10T14:34:22Z
dc.date.available2019-05-10T14:34:22Z
dc.date.issued2018-08-21
dc.date.submitted2018-08-20T22:00:11Z
dc.identifier.urihttps://hdl.handle.net/1956/19622
dc.description.abstractOne of the most dominant threats against web applications is the class of script injection attacks, also called cross-site scripting. This class of attacks affects the client-side of a web application, and is a critical vulnerability that is difficult to both detect and remediate for websites, often leading to insufficient server-side protection, which is why the end-users need an extra layer of protection at the client-side, utilizing the defense in depth strategy. In this thesis, a client-side filter for Mozilla Firefox is presented and implemented, with the goal of protecting against Reflected cross-site scripting attacks, while maintaining high performance. By conducting tests on the implemented solution, the conclusion is that the filter does provide more protection than the original Firefox version, at the same time achieving high performance, which with only some further improvements would become an effective option for end-users of web applications to protect themselves against Reflected cross-site scripting attacks.en_US
dc.language.isoengeng
dc.publisherThe University of Bergenen_US
dc.subjectclient-side filtereng
dc.subjectcross-site scriptingeng
dc.subjectweb browser protectioneng
dc.subjectxsseng
dc.subjectfirefoxeng
dc.titleCross-Site Scripting Protection in Firefox. Creating a filter for Firefox protecting against Reflected cross-site scripting attacksen_US
dc.typeMaster thesis
dc.date.updated2018-08-20T22:00:11Z
dc.rights.holderCopyright the Author. All rights reserveden_US
dc.description.degreeMasteroppgave i informatikken_US
dc.description.localcodeINF399
dc.subject.nus754199eng
fs.subjectcodeINF399
fs.unitcode12-12-0


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel