Please use this identifier to cite or link to this item:
https://idr.l4.nitk.ac.in/jspui/handle/123456789/7575
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madhusudhan, R. | |
dc.contributor.author | Shashidhara | |
dc.date.accessioned | 2020-03-30T10:02:31Z | - |
dc.date.available | 2020-03-30T10:02:31Z | - |
dc.date.issued | 2019 | |
dc.identifier.citation | 2018 2nd Cyber Security in Networking Conference, CSNet 2018, 2019, Vol., , pp.- | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7575 | - |
dc.description.abstract | XCS (Cross Channel Scripting) is a dangerous web application vulnerability, in which injection of the malicious code and attack execution is performed through network protocols. This vulnerability is the variant and sophistication concept of XSS (Cross-Site Scripting). We disclose a range of XCS attacks on embedded servers, which make use of electronic devices such as photo frames, cameras, wireless routers and wireless access points. All these devices have web interfaces, which permits an admin to perform various tasks on the device that is connecting from a web browser to the web server. An attack execution is carried by inserting malevolent code in the device, which is executed in the context of a legitimate user when he/she opens the page containing injected malicious code. This malevolent code can be inserted in the device through non web channels like SNMP (Simple Network Management Protocol), FTP (File Transfer Protocol) or NFS (Network File System). Unfortunately, the injected malicious code can fully compromise the security of devices, which are embedded in web servers. In this paper, a comprehensive analysis of the XCS exploitation and mitigation techniques have been presented. � 2018 IEEE. | en_US |
dc.title | Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.