Skip to content

Detects dynamic JavaScript that may leak sensitive data using a browser extension and server-side diffing. Based on an empirical study by Sebastian et al. (2015).

Notifications You must be signed in to change notification settings

TasnimFabiha/DynamicJS-Detection

Repository files navigation

#DynamicJS-Detection This repository is the implementation of the basic foundation of an empirical study, proposed by Sebastian et al 2015.

#1.The Empirical Study:

An approach to detect the presence of dynamic JavaScript on any web applications and finding the exploitation technique is presented in this implementation. Use of dynamic scripts on any web applications can lead to extreme occurrences of information leakage. Cross-Site Script Inclusion (XSSI), is such kind of security attack, that can be easily done by utilizing the advantage of using state-dependent dynamic JavaScript on web applications. An approach for Bangladeshi dataset is presented here for providing acuity of the occurrences of dynamic scripts and, determining how these occurrences can lead to severe consequences of information leakage. Keeping the above factors in mind, a methodology is proposed to experiment an empirical study. This is designed to gain insights into the prevalence and exploitability of data leakage caused by the use of dynamic script generation.

#1.1 How the extension works

The overall implementation can be descirbed in the following images. The extension works on the target web application. Collects scripts and sends those to the backend server.

dynamicJS detection approach

Figure 1: Detection Approach in Extension

The server stores all the scripts sources and requests those twice. Once with authentication cookies, once without. dynamicJS detection approach

Figure 1: Detection Approach in Server-side

The received responses are then compared if those differ. If the responses differ then the corresponding scripts are identified as dynamic dynamicJS detection approach

Figure 1: Detection of Dynamic JS

Thus, this overall approach works.

This approach is tested on Bangladeshi dataset. However, a dymmu dataset is also added to this repository to evaluate the performance of the implemented framework.

About

Detects dynamic JavaScript that may leak sensitive data using a browser extension and server-side diffing. Based on an empirical study by Sebastian et al. (2015).

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published