{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:32Z","timestamp":1740099272493,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_18","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"332-351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Xilara: An XSS Filter Based on HTML Template Restoration"],"prefix":"10.1007","author":[{"given":"Keitaro","family":"Yamazaki","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4305-8379","authenticated-orcid":false,"given":"Daisuke","family":"Kotani","sequence":"additional","affiliation":[]},{"given":"Yasuo","family":"Okabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"18_CR1","unstructured":"Wichers, D.: OWASP top-10 2013. OWASP Foundation, February 2013"},{"key":"18_CR2","unstructured":"Ross, D.: IE 8 XSS filter architecture\/implementation (2008). \nhttps:\/\/blogs.technet.microsoft.com\/srd\/2008\/08\/19\/ie-8-xss-filter-architecture-implementation\/"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Bates, D., Barth, A., Jackson, C.: Regular expressions considered harmful in client-side XSS filters. In: Proceedings of the 19th International Conference on World Wide Web, pp. 91\u2013100. ACM (2010)","DOI":"10.1145\/1772690.1772701"},{"key":"18_CR4","unstructured":"Trustwave: Modsecurity: open source web application firewall (2004). \nhttps:\/\/www.modsecurity.org\/"},{"key":"18_CR5","unstructured":"Wichers, D.: Types of cross-site scripting. \nhttps:\/\/www.owasp.org\/index.php\/Types_of_Cross-Site_Scripting"},{"key":"18_CR6","unstructured":"Dave, T., David Heinemeier, H.: Agile web development with rails. Citeseer (2005)"},{"key":"18_CR7","unstructured":"Lokhande, P., Aslam, F., Hawa, N., Munir, J., Gulamgaus, M.: Efficient way of web development using Python and Flask (2015)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Arasu, A., Garcia-Molina, H.: Extracting structured data from web pages. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 337\u2013348. ACM (2003)","DOI":"10.1145\/872757.872799"},{"key":"18_CR9","first-page":"109","volume":"1","author":"V Crescenzi","year":"2001","unstructured":"Crescenzi, V., Mecca, G., Merialdo, P., et al.: RoadRunner: towards automatic data extraction from large web sites. VLDB 1, 109\u2013118 (2001)","journal-title":"VLDB"},{"issue":"12","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/TKDE.2006.197","volume":"18","author":"Y Zhai","year":"2006","unstructured":"Zhai, Y., Liu, B.: Structured data extraction from the web based on partial tree alignment. IEEE Trans. Knowl. Data Eng. 18(12), 1614\u20131628 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"18_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-319-05149-9_7","volume-title":"Information Security Applications","author":"A Javed","year":"2014","unstructured":"Javed, A., Schwenk, J.: Towards elimination of cross-site scripting on mobile versions of web applications. In: Kim, Y., Lee, H., Perrig, A. (eds.) WISA 2013. LNCS, vol. 8267, pp. 103\u2013123. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-05149-9_7"},{"key":"18_CR12","unstructured":"Kettle, J.: When security features collide (2017). \nhttp:\/\/blog.portswigger.net\/2017\/10\/when-security-features-collide.html"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Stamm, S., Sterne, B., Markham, G.: Reining in the web with content security policy. In: Proceedings of the 19th International Conference on World Wide Web, pp. 921\u2013930. ACM (2010)","DOI":"10.1145\/1772690.1772784"},{"key":"18_CR14","unstructured":"Van Gundy, M., Chen, H.: Noncespaces: using randomization to enforce information flow tracking and thwart cross-site scripting attacks. In: NDSS (2009)"},{"key":"18_CR15","unstructured":"Nadji, Y., Saxena, P., Song, D.: Document structure integrity: a robust basis for cross-site scripting defense. In: NDSS, vol. 2009, p. 20 (2009)"},{"key":"18_CR16","unstructured":"Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P., Karagiannis, T.: xJS: practical XSS prevention for web application development. In: Proceedings of the 2010 USENIX Conference on Web Application Development, p. 13. USENIX Association (2010)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Weichselbaum, L., Spagnuolo, M., Lekies, S., Janc, A.: CSP is dead, long live CSP! On the insecurity of whitelists and the future of content security policy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1376\u20131387. ACM (2016)","DOI":"10.1145\/2976749.2978363"},{"issue":"4","key":"18_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1023\/A:1019213109274","volume":"2","author":"A Heydon","year":"1999","unstructured":"Heydon, A., Najork, M.: Mercator: a scalable, extensible web crawler. World Wide Web 2(4), 219\u2013229 (1999)","journal-title":"World Wide Web"},{"key":"18_CR19","unstructured":"Gal\u00e1n, E., Alcaide, A., Orfila, A., Blasco, J.: A multi-agent scanner to detect stored-XSS vulnerabilities. In: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1\u20136. IEEE (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:08:46Z","timestamp":1545995326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}