Research Paper
Research Paper
O. S. Jannath Nisha
S. Mary Saira Bhanu
Department of Computer Science and Engineering
Department of Computer Science and Engineering
National Institute of Technology,
National Institute of Technology,
Tiruchirappalli-620 015, India
Tiruchirappalli-620 015, India
406115006@nitt.edu
msb@nitt.edu
2 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
Stepping-Stone Attack user's machine. Code injection attack on mobile application is
shown in Fig.3
Malicious Insiders
Contacts
Cross VM Attacks
Calender
IaaS Attacks Internal Code
Return Oriented Injection
Channels SMS
VM Rollback
Code
Injection File System
Programming Attack
Attacks
on
Website(XSS)
Phishing Attack HTML5
-based
Password Reset Attack Mobile MP3
Attack
PaaS Attacks Apps
Surface on
service Man-in-the-Middle Attack
External Code Wi-Fi
delivery Injection
model Cloud Malware Injection Channels
Attack Bluetooth
Barcode
Distributed Denial
of Service attack
Authentication Attack
Fig.3 Code Injection Attacks
XML Signature Wrapping
SaaS Attacks
Attack HTML5-based [11] apps are prone to wider attack surface than
web apps. Code injection attack acquires the primary cause of
SQL injection Attack
XSS and it uses external and internal channels to insert code.
Cross-Side-Scripting Mobile devices have many channels through which attack can
Attack happen such as Contact, SMS, Barcode, MP3, Wi-Fi access
Fig.2 Taxonomy of Attacks on Cloud Service Delivery Models points, Calendar, and Bluetooth. Fig.4 shows the XSS attack on
web applications.
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 137
Query Detector and Script Detector. The client sends the both
The same authors in [23] proposed a server side code injection
modules. First, the Query detector endorses only the valid
technique that inserts comment statements consisting of tokens
requests and they are passed on to the next module. The Script
generated randomly and features of virtuous JavaScript code.
detector filters the invalid tags and the HTML content before
This approach detects only a part of code injection attack.
forwarding it to the web server to prevent SQL and XSS
There is no automated process in JavaScript parser to remove
attack. The disadvantage of this approach is that it requires
the preprocessing techniques such as command tags and return
more time to respond.
keyword in event handlers.
Mukesh Kumar et al., [16] presented static analysis techniques
Martin et al., [24] presented a solution to fracking attacks,
to explore SQL Injection and XSS vulnerabilities available in
NOFRAK, which prevents untrusted foreign-origin web
web application's source code. The aim of this technique is to
content to access device resources directly. It requires no
find the vulnerable nature present in source code before it can
changes to the existing hybrid app's code but modifies the
be exploited in real time application. Takeshi Matsuda et al.,
PhoneGap framework. A third-party app can load web content
[17] proposed a detection algorithm to extract an attack feature but cannot access local resources on the device. This method
of XSS by taking into account the frequency of symbols and its limits the privilege of untrusted code and blocks them to access
position. The main shortcomings are calculation based, given sensitive local resources.
the suitable threshold value and it does not determine the
unknown attacks efficiently.
Gupta Sand Gupta BB [25] proposed a server-side automated
framework, XSS-SAFE (Cross-Site Scripting Secure Web
Andrea Avancini et al., [18] resorted to search based security Application FramEwork) which is designed for detection and
testing of web applications. The author used static analysis prevention of XSS attacks. This technique discovers the XSS
technique to search cross-site scripting attacks by using a attack vectors in the HTTP response messages by injecting the
genetic algorithm. Generation of test cases depend on static features of benign JavaScript code and randomly generated
analysis, but it experiences many limitations such as high false tokens. After the successful detection of injected XSS attack
negative rate and high false positive. Here the genetic vectors sanitizers are automatically placed in the JS code. Then
algorithm uses less number of iterations to save time on the HRES message will be sent to the web browser without any
infeasible paths. Cao et al., [19] developed a tool called Path malicious JavaScript code. The precision of extorted
cutter, which blocks the propagation of unsafe JavaScript API characteristics of JavaScript cannot be guaranteed.
through XSS vulnerabilities by dynamic analysis. The
limitation perceived from this method is rendering latency at
The same authors in [26] also introduced JS-SAN (JavaScript
the Web browser. Chandra et al., [20] proposed BIXSAN
SANitizer) method to mitigate JS code injection vulnerabilities
techniques which takes some sample scripts from XSS cheat
using an injection and clustering sanitization framework. To
sheet and filters out the harmful content and converts the rest
produce a compressed template of JS attack vector, JS-SAN
of the HTML content into Document Object Model (DOM).
performed clustering on the extracted JS attack vector
payloads. JS-SAN injected the sanitizer on the compressed
Gundy et al., [21] presented a mechanism called Noncespaces template in the JS code of web applications automatically.
that randomizes the (X)HTML tags and its characteristics to
detect and alleviate inserted harmful script in all documents
Table 1 provides a summary of several related techniques on
before transferring it to the browser. This mechanism is used to
the detection of XSS attacks on HTML5 -based apps. The first
remove malicious content in the web browser and restricts the
column highlights the topics of the different related work. The
untrusted content from changing the DOM tree. Due to the
second and third column emphasizes the pros and cons to
unpredictability of the randomized tags the attackers produce
identify the research gaps.
parsing faults when they try to insert the perfect delimiters in
the untrusted content to sever the containing node. VI. CONCLUSION
This paper reviews mobile cloud computing technology that
Shaihriaret et al., [22] proposed a method to detect the attacks
provides services to mobile devices through cloud
at the server. This technique follows the concept of boundary
environment. The main emphasis of this survey is to study
injection to enclose dynamic-generated content and policy
about the different channels of code injection attacks. XSS
generation to confirm the data. It is developed on the concept
attack is applicable to code injection attack through only one
of boundary injection to encapsulate dynamic-generated
channel for web based applications where in mobile
content and policy generation to validate the data. The
applications, the code injection is performed through many
boundary injection method identifies legitimate features such
channels. So, in order to overcome the above challenges,
as HTML tags, java script content that are analyzed in HTTP
number of solutions has been taken into consideration for the
response page to detect the XSS attacks. This approach takes
time in performing the policy checks and thus degrading the detection of scripting attacks. The existing contemporary
performance in detecting attack capabilities. techniques are not effective in identification of XSS attacks.
138 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
Similarly, some of the techniques are infeasible in reality since many new channels are exploited along with the development
they could not handle all channels of attack. The existing of mobile devices to inject malicious code. Hence, it is
solutions concentrate only on the known injection channels but necessary to provide detection mechanism to accomplish
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 139
security against code injection. Meta-heuristics algorithms can [19] Cao.Y,Yegneswaran,.V, Possas,.P, and Chen,“Pathcutter: severing the
be used for feature selection and various classification models self-propagation path of xssjavascript worms in social web networks,”
can be used to enhance the classification accuracy and reduce In: Proceedings of the 19thNetwork andDistributed System Security
the number of features extracted from the combination of static Symposium (NDSS), San Diego, CA, USA (2012).
and dynamic techniques. [20] Chandra.V.S, and Selvakumar. S, “Bixsan: browser independent XSS
sanitizer for prevention of XSS attacks,”ACM SIGSOFT Softw. Eng.
Notes 36(5), 1 (2011).
REFERENCES
[21] Gundy.MV, and Chen.H, “Noncespaces:using randomization to defeat
[1] M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, "On Technical cross-site scripting attacks,” Computer Security 31(4):612–628(2012).
Security Issues in Cloud Computing," in PROC IEEE ICCC,
[22] Shaihriar.H, andZulkernine.M, “ S2XS2: a server side approach to
Bangalore,
pp. 109-116, 2009. automatically detect XSS attacks,” In: Ninth international conference
on dependable, automatic secure computing. IEEE, pp 7–17 (2011a)
[2] Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in
[23] Shaihriar.H,andZulkernine. M, “ Injecting comments to detect
Mobile Cloud Computing: Taxonomy and Open Challenges,” IEEE
JavaScript code injection attacks,” In: Proceedings of the 6 th IEEE
Communications Surveys and Tutorials, vol. 16, no. 1, pp.369-392,
workshop on security, trust, and privacy for software applications,
2014.
Munich, Germany, pp 104–109(2011b).
[3] http://www.mobilecloudcomputingforum.com/.
[24] Martin Georgiev, Suman Jana, and Vitaly Shmatikov. “Breaking and
[4] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: fixing origin-based access control in hybrid web/mobile application
A survey,” Future Generation Computer Systems, vol. 29, no. 1, pp.
frameworks,” 2014.
84– 106, 2013.
[25] X. Jin, L. Wang, T. Luo, and W. Du. “Fine-Grained Access Control for
[5] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile
HTML5-Based Mobile Applications in Android,” In Proceedings of
cloud computing: Architecture, applications, and approaches,”
Wireless Communicationsand Mobile Computing, (2013. the 16th Information Security Conference (ISC) , 2013
[6] Hazarika, Pinku, VinodBaliga, and SeshubabuTolety, "The mobile- [26] Gupta, Shashank, and B. B. Gupta. "XSS-SAFE: a server-side
cloud computing (MCC) roadblocks," Eleventh International approach to detect and mitigate cross-site scripting (XSS) attacks in
Conference on Wireless and Optical Communications Networks JavaScript code."Arabian Journal for Science and Engineering 41.3
(WOCN), 2014. (2016): 897-
920.
[7] A. N. Khana, M. L. M. Kiaha, S. U. Khanb and S. A. Madanic,
"Towards secure mobile cloud computing: A survey," Future [27] Gupta, Shashank, and Brij Bhooshan Gupta. "JSǦ SAN: defense
Generation Computer Systems, vol. 29, Issue 5, 2013. mechanism for HTML5Ǧ based web applications against javascript
code injection vulnerabilities."Security and Communication Networks
[8] Atul S. Choudhary and M.L Dhore, “CIDT: Detection Of 9.11 (2016): 1477-1495.
MaliciousCode Injection Attacks On Web Application,”International
Journal Of Computing Applications, Vol.-52-N0.2, PP. 19-25 (2012). [28] Gupta, Shashank, and B. B. Gupta. "Enhanced XSS Defensive
Framework for Web Applications Deployed in the Virtual Machines of
[9] HTML5. http://en.wikipedia.org/wiki/HTML5 Cloud Computing Environment."Procedia Technology 24 (2016): 1595-
[10] X. Jin, T. Luo,D. Tsui, and W. Du, “Code injection attacks on 1602.
HTML5- based mobile apps,” In MoST, (2014). [29] Gupta, Shashank, and Brij Bhooshan Gupta. "PHP-sensor: a prototype
[11] Jin. X, Hu .X, and Ying. K, “Code injection attacks on HTML5-based method to discover workflow violation and XSS vulnerabilities in PHP
mobile apps: Characterization, detection and mitigation,” Proceedings web applications."Proceedings of the 12th ACM International
of the 2014 ACM SIGSAC Conference on Computer and Conference on Computing Frontiers. ACM, 2015.
Communications Security. ACM, pp.66-67(2014). [30] Gupta, B. B., et al. "Cross-site scripting (XSS) abuse and defense:
[12] WebView, https://developer.android.com/reference/android/webkit/Web exploitation on several testing bed environments and its
View.html. defense."Journal of Information Privacy and Security 11.2 (2015):
118-
[13] P. Sharma, R. Johari, and S. S. Sarma, “Integrated approach to prevent
136.
SQL injection attack and reflected crosssite scripting attack,”
International Journal of System Assurance Engineering and [31] Gupta, Shashank, and Brij Bhooshan Gupta. "Cross-Site Scripting
Management, vol. 3, no. 4, pp.343-351(2012). (XSS) attacks and defense mechanisms: classification and state-of-the-
art."International Journal of System Assurance Engineering and
[14] Xi Xiao, Ruibo Yan, Runguo Ye, Qing Li, SanchengPeng, and Yong
Management 8.1 (2017): 512-530.
Jiang , “Detection and Prevention of Code Injection Attacks on
HTML5- based Apps,” Third International Conference on Advanced
Cloud and Big Data(2015).
[15] Guowei Dong , Yan Zhang, Xin Wang, Peng Wang, and Liangkun Liu,
“Detecting Cross Site Scripting Vulnerabilities Introduced by
HTML5,” 11th International Joint Conference on Computer Science
and Software Engineering (2014).
[16] Mukesh Kumar Gupta, “Static Analysis Approaches to Detect SQL
Injection and Cross Site Scripting Vulnerabilities in Web
Applications: A Survey,”IEEE International Conference on Recent
Advances and Innovation in Engineering(ICRAIE-2014) ,
Jaipur(2014).
[17] Takeshi Matsuda, “Cross Site Scripting Attacks Detection Algorithm
Based on the Appearance Position of Characters,”The 5th International
Conference on Communications, Computers and Applications (MIC-
CCA2012); Istanbul, Turkey(2012).
[18] Andrea Avancini, andMariano, “Security Testing of Web Applications:
a Search Based Approach for Cross-Site Scripting Vulnerabilities,”
11th IEEE International Working Conference on Source Code
Analysis and Manipulation(2011).
140 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)