Cross-Browser Rendering using Headless Server-Side Browsers
Autor(a) principal: | |
---|---|
Data de Publicação: | 2016 |
Tipo de documento: | Dissertação |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | https://hdl.handle.net/10216/90394 |
Resumo: | Nowadays many different browsers are used to navigate the Web, ranging from the most well known, Internet Explorer, Chrome, Safari or Firefox to less well known browsers such as Opera. These browsers are typically proprietary to the companies they belong to, hence, differing in their operations, of particular interest to this dissertation, the processing of HTML, CSS and JavaScript files which leads to the generation of different web pages, resulting in slightly different user experiences. In order to homogenize the differences between browsers, the idea of cross browser testing and rendering has become a topic of research. Cross browser rendering is the ability to generate a user interface also known as a web page, according to the browser specified. This way developers may test with more ease how their code behaves under different execution environments. However this technology can be used for more than enabling a web developer to test their code, it can also be used to detect security breaches. As the Internet becomes an ever-growing, relevant de facto tool in communication flow for a wide range of areas, from entertainment to banking, it also becomes the target medium for cyber attacks to occur. Amongst the most harmful cyber attack in existence, of particular interest to this thesis are Client-side Injection attacks. One of the ways in which these types of attacks can be detected is by checking whether a webpages source code somehow varies from a "clean" version provided by the web host, which has undergone no local modifications. By leveraging cross browser rendering, it becomes possible to minimize errors in malicious code detection algorithms by eliminating the rendering differences inherent to each particular browser. As such, this dissertation intends to provide the basis for a tool which allows the identification and categorisation of differences between client-side web pages and the original server code which are considered harmless. |
id |
RCAP_b75f2bbda9c3c3d011173b3ea9ac38f5 |
---|---|
oai_identifier_str |
oai:repositorio-aberto.up.pt:10216/90394 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Cross-Browser Rendering using Headless Server-Side BrowsersEngenharia electrotécnica, electrónica e informáticaElectrical engineering, Electronic engineering, Information engineeringNowadays many different browsers are used to navigate the Web, ranging from the most well known, Internet Explorer, Chrome, Safari or Firefox to less well known browsers such as Opera. These browsers are typically proprietary to the companies they belong to, hence, differing in their operations, of particular interest to this dissertation, the processing of HTML, CSS and JavaScript files which leads to the generation of different web pages, resulting in slightly different user experiences. In order to homogenize the differences between browsers, the idea of cross browser testing and rendering has become a topic of research. Cross browser rendering is the ability to generate a user interface also known as a web page, according to the browser specified. This way developers may test with more ease how their code behaves under different execution environments. However this technology can be used for more than enabling a web developer to test their code, it can also be used to detect security breaches. As the Internet becomes an ever-growing, relevant de facto tool in communication flow for a wide range of areas, from entertainment to banking, it also becomes the target medium for cyber attacks to occur. Amongst the most harmful cyber attack in existence, of particular interest to this thesis are Client-side Injection attacks. One of the ways in which these types of attacks can be detected is by checking whether a webpages source code somehow varies from a "clean" version provided by the web host, which has undergone no local modifications. By leveraging cross browser rendering, it becomes possible to minimize errors in malicious code detection algorithms by eliminating the rendering differences inherent to each particular browser. As such, this dissertation intends to provide the basis for a tool which allows the identification and categorisation of differences between client-side web pages and the original server code which are considered harmless.2016-07-052016-07-05T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttps://hdl.handle.net/10216/90394TID:201316242engPedro Cardoso Lessa e Silvainfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-11-29T13:52:36Zoai:repositorio-aberto.up.pt:10216/90394Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T23:49:28.590430Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Cross-Browser Rendering using Headless Server-Side Browsers |
title |
Cross-Browser Rendering using Headless Server-Side Browsers |
spellingShingle |
Cross-Browser Rendering using Headless Server-Side Browsers Pedro Cardoso Lessa e Silva Engenharia electrotécnica, electrónica e informática Electrical engineering, Electronic engineering, Information engineering |
title_short |
Cross-Browser Rendering using Headless Server-Side Browsers |
title_full |
Cross-Browser Rendering using Headless Server-Side Browsers |
title_fullStr |
Cross-Browser Rendering using Headless Server-Side Browsers |
title_full_unstemmed |
Cross-Browser Rendering using Headless Server-Side Browsers |
title_sort |
Cross-Browser Rendering using Headless Server-Side Browsers |
author |
Pedro Cardoso Lessa e Silva |
author_facet |
Pedro Cardoso Lessa e Silva |
author_role |
author |
dc.contributor.author.fl_str_mv |
Pedro Cardoso Lessa e Silva |
dc.subject.por.fl_str_mv |
Engenharia electrotécnica, electrónica e informática Electrical engineering, Electronic engineering, Information engineering |
topic |
Engenharia electrotécnica, electrónica e informática Electrical engineering, Electronic engineering, Information engineering |
description |
Nowadays many different browsers are used to navigate the Web, ranging from the most well known, Internet Explorer, Chrome, Safari or Firefox to less well known browsers such as Opera. These browsers are typically proprietary to the companies they belong to, hence, differing in their operations, of particular interest to this dissertation, the processing of HTML, CSS and JavaScript files which leads to the generation of different web pages, resulting in slightly different user experiences. In order to homogenize the differences between browsers, the idea of cross browser testing and rendering has become a topic of research. Cross browser rendering is the ability to generate a user interface also known as a web page, according to the browser specified. This way developers may test with more ease how their code behaves under different execution environments. However this technology can be used for more than enabling a web developer to test their code, it can also be used to detect security breaches. As the Internet becomes an ever-growing, relevant de facto tool in communication flow for a wide range of areas, from entertainment to banking, it also becomes the target medium for cyber attacks to occur. Amongst the most harmful cyber attack in existence, of particular interest to this thesis are Client-side Injection attacks. One of the ways in which these types of attacks can be detected is by checking whether a webpages source code somehow varies from a "clean" version provided by the web host, which has undergone no local modifications. By leveraging cross browser rendering, it becomes possible to minimize errors in malicious code detection algorithms by eliminating the rendering differences inherent to each particular browser. As such, this dissertation intends to provide the basis for a tool which allows the identification and categorisation of differences between client-side web pages and the original server code which are considered harmless. |
publishDate |
2016 |
dc.date.none.fl_str_mv |
2016-07-05 2016-07-05T00:00:00Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/masterThesis |
format |
masterThesis |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://hdl.handle.net/10216/90394 TID:201316242 |
url |
https://hdl.handle.net/10216/90394 |
identifier_str_mv |
TID:201316242 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799135814345555968 |