scholarly journals A Protection Mechanism against Malicious HTML and JavaScript Code in Vulnerable Web Applications

2016 ◽  
Vol 2016 ◽  
pp. 1-14
Author(s):  
Shukai Liu ◽  
Xuexiong Yan ◽  
Qingxian Wang ◽  
Xu Zhao ◽  
Chuansen Chai ◽  
...  

The high-profile attacks of malicious HTML and JavaScript code have seen a dramatic increase in both awareness and exploitation in recent years. Unfortunately, exiting security mechanisms provide no enough protection. We propose a new protection mechanism named PMHJ based on the support of both web applications and web browsers against malicious HTML and JavaScript code in vulnerable web applications. PMHJ prevents the injection attack of HTML elements with a random attribute value and the node-split attack by an attribute with the hash value of the HTML element. PMHJ ensures the content security in web pages by verifying HTML elements, confining the insecure HTML usages which can be exploited by attackers, and disabling the JavaScript APIs which may incur injection vulnerabilities. PMHJ provides a flexible way to rein the high-risk JavaScript APIs with powerful ability according to the principle of least authority. The PMHJ policy is easy to be deployed into real-world web applications. The test results show that PMHJ has little influence on the run time and code size of web pages.

Author(s):  
Ahmad Al-Ahmad ◽  
Belal Abu Ata ◽  
Abdullah Wahbeh

As many Web applications are developed daily and used extensively, it becomes important for developers and testers to improve these application securities. Pen testing is a technique that helps these developers and testers to ensure that the security levels of their Web application are at acceptable level to be used safely. Different tools are available for Pen testing Web applications; in this paper the authors compared six Pen testing tools for Web applications. The main goal of these tests is to check whether there are any security vulnerabilities in Web applications. A list of faults injected into set of Web pages is used in order to check if tools can find them as they are claimed. Test results showed that these tools are not efficient and developers should not depend solely on them.


Author(s):  
Shashank Gupta ◽  
B. B. Gupta

Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.


Author(s):  
Shashank Gupta ◽  
B. B. Gupta

Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.


2021 ◽  
Vol 6 (1) ◽  
pp. 20
Author(s):  
Dedi Iskandar ◽  
Dina Indarti

This research aims to design, create, and test the quality of e-recruitment web applications at a financing company in Indonesia based on ISO/IEC 9126. Methods used in this study are Research and Development (R&D) including potential identification and problems, analysis and data collection, application design, implementation, application validation, application revision, and application trials. E-Recruitment web application was created using LAMP (Linux, Apache, MySQL, PHP). Application quality testing based on 6 factors namely functionality, reliability, efficiency, usability, maintainability, and portability. Functionality factor was tested using black box testing. The efficiency factor was tested using GT Metrix (Yslow) and PageSpeed Insight. The reliability factor was tested using stress testing (LoadStrom, LoadImpact, and WAPT 8.1). The maintainability factor was tested based on instrumentation, consistency, and simplicity aspects. The portability factor was tested using multiple web browsers, and usability factor using Computer System Usability Questionnaire. Based on the results of the research that has been done, e-recruitment web application is able to run well with some revisions from recruitment experts and programming experts. Application test results based on ISO/IEC 9126 have met the application quality factor standards of functionality, reliability, usability, maintainability, and portability. The efficiency factor still do not meet the application quality factor standards.


2020 ◽  
Vol 5 (2) ◽  
pp. 125
Author(s):  
Raden Alifian Setiawan ◽  
Hanna Hanna ◽  
Alberth Alberth

The use of videos in education makes it possible to overcome practical real-world constraints and explore far greater possibilities provided by digital spaces, especially for the video uploaded in online platform such as blog. This study examines whether online video blog as media have a significant effect on students’ achievement of passive voice. It used pre-experimental (one group pre-test and post-test) design. The samples of this study were 10 students at 4J Operation. A pre-test and post-test were conducted by using multiple choice questions as the instruments. Data analysis was through paired-sample t-test. Results showed that there was an increase in mean score of pre-test (49,1) and post-test (63,5). Data from Paired Sample t-test showed that Sig. (2-tailed) was 0.000 which was smaller than .05 which means that there was significance difference in mean score after employing treatment.


Author(s):  
Danielle Spencer

This book identifies and names the phenomenon of metagnosis: the experience of newly learning in adulthood of a long-standing condition. It can occur when the condition has remained undetected (e.g., colorblindness) and/or when the diagnostic categories themselves have shifted (e.g., ADHD). More broadly, it can occur with unexpected revelations bearing upon selfhood, such as surprising genetic test results. This phenomenon has received relatively scant attention, yet learning of an unknown condition is frequently a significant and bewildering revelation, subverting narrative expectations and customary categories. In addressing the topic this book deploys an evolution of narrative medicine as a robust research methodology comprising interdisciplinarity, narrative attentiveness, and creating a writerly text. Beginning with the author’s own experience of metagnosis, it explores the issues it raises—from communicability to narrative intelligibility to different ways of seeing. Next, it traces the distinctive metagnostic narrative arc through the stages of recognition, subversion, and renegotiation, discussing this trajectory in light of a range of metagnostic experiences, from Blade Runner to real-world midlife diagnoses. Finally, it situates metagnosis in relation to genetic revelations and the broader discourses concerning identity. Proposing that the figure of blindsight—drawn from the author’s metagnostic experience—offers a productive model for negotiating such revelations, the book suggests that better understanding metagnosis will not simply aid those directly affected but will also serve as a bellwether for how we will all navigate advancing biomedical and genomic knowledge, and how we may fruitfully interrogate the very notion of identity.


2015 ◽  
Vol 4 (5) ◽  
pp. 261-266 ◽  
Author(s):  
Anna Woodard ◽  
R. Marshall Austin ◽  
Zaibo Li ◽  
Joseph Beere ◽  
Chengquan Zhao
Keyword(s):  
Hpv 16 ◽  
Hpv Test ◽  

2020 ◽  
pp. 155005942098270
Author(s):  
Sarah Ahmed ◽  
Jennifer R. Lepock ◽  
Romina Mizrahi ◽  
R. Michael Bagby ◽  
Cory J. Gerritsen ◽  
...  

Aim Deficits in synchronous, gamma-frequency neural oscillations may contribute to schizophrenia patients’ real-world functional impairment and can be measured electroencephalographically using the auditory steady-state response (ASSR). Gamma ASSR deficits have been reported in schizophrenia patients and individuals at clinical high risk (CHR) for developing psychosis. We hypothesized that, in CHR patients, gamma ASSR would correlate with real-world functioning, consistent with a role for gamma synchrony deficits in functional impairment. Methods A total of 35 CHR patients rated on Global Functioning: Social and Role scales had EEG recorded while listening to 1-ms, 93-dB clicks presented at 40 Hz in 500-ms trains, in response to which 40-Hz evoked power and intertrial phase-locking factor (PLF) were measured. Results In CHR patients, lower 40-Hz PLF correlated with lower social functioning. Conclusions Gamma synchrony deficits may be a biomarker of real-world impairment at early stages of the schizophrenia disease trajectory.


2020 ◽  
Vol 41 (Supplement_2) ◽  
Author(s):  
P McEwan ◽  
L Hoskin ◽  
K Badora ◽  
D Sugrue ◽  
G James ◽  
...  

Abstract Background Patients with chronic kidney disease (CKD), heart failure (HF), resistant hypertension (RHTN) and diabetes are at an increased risk of hyperkalaemia (HK) which can be potentially life-threatening, as a result of cardiac arrhythmias, cardiac arrest leading to sudden death. In these patients, renin-angiotensin-aldosterone system inhibitors (RAASi), are used to manage several cardiovascular and renal conditions, and are associated with an increased risk of HK. Assessing the burden of HK in real-world clinical practice may concentrate relevant care on those patients most in need, potentially improving patient outcomes and efficiency of the healthcare system. Purpose To assess the burden of HK in a real-world population of UK patients with at least one of: RHTN, Type I or II diabetes, CKD stage 3+, dialysis, HF, or in receipt of a prescription for RAASi. Methods Primary and secondary care data for this retrospective study were obtained from the UK Clinical Practice Research Datalink (CPRD) and linked Hospital Episode Statistics (HES). Eligible patients were identified using READ codes defining the relevant diagnosis, receipt of indication-specific medication, or, in the case of CKD, an estimated glomerular filtration rate (eGFR) ≤60 ml/min/1.73m2 within the study period (01 January 2008 to 30 June 2018) or in the five-year lookback period (2003–2007). The index date was defined as 01 January 2008 or first diagnosis of an eligible condition or RAASi prescription, whichever occurred latest. HK was defined as K+ ≥5.0 mmol/L; thresholds of ≥5.5 mmol/L and ≥6.0 mmol/L were explored as sensitivity analyses. Incidence rates of HK were calculated with 95% confidence intervals (CI). Results The total eligible population across all cohorts was 931,460 patients. RHTN was the most prevalent comorbidity (n=317,135; 34.0%) and dialysis the least prevalent (n=4,415; 0.5%). The majority of the eligible population were prescribed RAASi during follow-up (n=754,523; 81.0%). At a K+ threshold of ≥5.0 mmol/L, the dialysis cohort had the highest rate of HK (501.0 events per 1,000 patient-years), followed by HF (490.9), CKD (410.9), diabetes (355.0), RHTN (261.4) and the RAASi cohort (211.2) (Figure 1). This pattern was still observed at alternative threshold definitions of HK. Conclusion This large real-world study of UK patients demonstrates the burden of hyperkalaemia in high-risk patient populations from the UK. There is a need for effective prevention and treatment of HK, particularly in patients with CKD, dialysis or HF where increased incidence rates are observed which in turn will improve patient outcomes and healthcare resource usage. Figure 1. Rates of HK by condition Funding Acknowledgement Type of funding source: Private company. Main funding source(s): AstraZeneca


Sign in / Sign up

Export Citation Format

Share Document