Please use this identifier to cite or link to this item:

Fighting Against XSS Attacks. A Usability Evaluation of OWASP ESAPI Output Encoding

File Size Format  
0727.pdf 258.5 kB Adobe PDF View/Open

Item Summary

Title:Fighting Against XSS Attacks. A Usability Evaluation of OWASP ESAPI Output Encoding
Authors:Wijayarathna, Chamila
Gamagedara Arachchilage, Nalin
Keywords:Cybersecurity and Software Assurance
Software Technology
Cross Site Scripting, OWASP ESAPI, Usability, Security APIs
Date Issued:08 Jan 2019
Abstract:Cross Site Scripting (XSS) is one of the most critical vulnerabilities exist in web applications. XSS can be prevented by encoding untrusted data that are loaded into browser content of web applications. Security Application Programming Interfaces (APIs) such as OWASP ESAPI provide output encoding functionalities for programmers to use to protect their applications from XSS attacks. However, XSS still being ranked as one of the most critical vulnerabilities in web applications suggests that programmers are not effectively using those APIs to encode untrusted data. Therefore, we conducted an experimental study with 10 programmers where they attempted to fix XSS vulnerabilities of a web application using the output encoding functionality of OWASP ESAPI. Results revealed 3 types of mistakes that programmers made which resulted in them failing to fix the application by removing XSS vulnerabilities. We also identified 16 usability issues of OWASP ESAPI. We identified that some of these usability issues as the reason for mistakes that programmers made. Based on these results, we provided suggestions on how the usability of output encoding APIs should be improved to give a better experience to programmers.
Pages/Duration:10 pages
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections: Cybersecurity and Software Assurance

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons