首页> 外文期刊>ACM transactions on the web >A Measurement Study of Insecure JavaScript Practices on the Web
【24h】

A Measurement Study of Insecure JavaScript Practices on the Web

机译:Web上不安全的JavaScript实践的度量研究

获取原文
获取原文并翻译 | 示例

摘要

JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage documents and browser windows, however, it has also opened the door for many browser-based security attacks. Insecure engineering practices of using JavaScript may not directly lead to security breaches, but they can create new attack vectors and greatly increase the risks of browser-based attacks. In this article, we present the first measurement study on insecure practices of using JavaScript on the Web. Our focus is on the insecure practices of JavaScript inclusion and dynamic generation, and we examine their severity and nature on 6,805 unique websites. Our measurement results reveal that insecure JavaScript practices are common at various websites: (1) at least 66.4% of the measured websites manifest the insecure practices of including JavaScript files from external domains into the top-level documents of their webpages; (2) over 44.4% of the measured websites use the dangerous eval() function to dynamically generate and execute JavaScript code on their webpages; and (3) in JavaScript dynamic generation, using the document.write() method and the innerHTML property is much more popular than using the relatively secure technique of creating script elements via DOM methods. Our analysis indicates that safe alternatives to these insecure practices exist in common cases and ought to be adopted by website developers and administrators for reducing potential security risks.
机译:JavaScript是一种解释型编程语言,最常用于增强网页的交互性和功能。它具有与网页文档和浏览器窗口进行交互的强大功能,但是,它也为许多基于浏览器的安全攻击打开了大门。使用JavaScript的不安全工程实践可能不会直接导致安全漏洞,但是它们可以创建新的攻击媒介,并大大增加基于浏览器的攻击的风险。在本文中,我们提出了关于在Web上使用JavaScript的不安全实践的首次评估研究。我们的重点是JavaScript包含和动态生成的不安全做法,我们在6,805个唯一的网站上检查了它们的严重性和性质。我们的测量结果表明,不安全的JavaScript做法在各种网站上都很普遍:(1)至少66.4%的被测量网站显示出将来自外部域的JavaScript文件包含到其网页的顶级文档中的不安全行为; (2)超过44.4%的被测网站使用危险的eval()函数在其网页上动态生成和执行JavaScript代码; (3)在JavaScript动态生成中,使用document.write()方法和innerHTML属性比使用相对安全的通过DOM方法创建脚本元素的技术流行得多。我们的分析表明,在常见情况下,可以使用这些不安全做法的替代方法,并且网站开发人员和管理员应采用这些方法来减少潜在的安全风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号