{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:05:35Z","timestamp":1743012335411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031474507"},{"type":"electronic","value":"9783031474514"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47451-4_42","type":"book-chapter","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T20:02:04Z","timestamp":1698782524000},"page":"590-596","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Implementation of Man-in-the-Browser Attack and Defense Method in the Google Chrome Browser"],"prefix":"10.1007","author":[{"given":"Jizhou","family":"Tong","sequence":"first","affiliation":[]},{"given":"Joshua C.","family":"Nwokeji","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,1]]},"reference":[{"key":"42_CR1","doi-asserted-by":"publisher","unstructured":"Chordiya, A.R., Majumder, S., Javaid, A.Y.: Man-in-the-Middle (MITM) attack based hijacking of http traffic using open source tools. In: 2018 IEEE International Conference on Electro\/Information Technology (EIT), pp. 0438\u20130443 (2018).https:\/\/doi.org\/10.1109\/EIT.2018.8500144","DOI":"10.1109\/EIT.2018.8500144"},{"key":"42_CR2","doi-asserted-by":"publisher","unstructured":"Rauti, S.: Man-in-the-browser attack: a case study on malicious browser extensions. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds.) Security in Computing and Communications, SSCC 2019. Communications in Computer and Information Science, vol. 1208. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-4825-3_5","DOI":"10.1007\/978-981-15-4825-3_5"},{"key":"42_CR3","doi-asserted-by":"publisher","unstructured":"Rauti, S., Laato, S., Pitk\u00e4m\u00e4ki, T.: Man-in-the-Browser attacks against IoT devices: a Study of Smart Homes. In: Abraham, A., et al. In: Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol. 1383. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73689-7_69","DOI":"10.1007\/978-3-030-73689-7_69"},{"key":"42_CR4","doi-asserted-by":"publisher","unstructured":"Varshney, G., Misra, M., Atrey, P.: Browshing a new way of phishing using a malicious browser extension. In: 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/IPACT.2017.8245147","DOI":"10.1109\/IPACT.2017.8245147"},{"key":"42_CR5","doi-asserted-by":"publisher","unstructured":"Varshney, G., Bagade, S., Sinha, S.: Malicious browser extensions: a growing threat: a case study on Google Chrome: ongoing work in progress. In: 2018 International Conference on Information Networking (ICOIN), pp. 188\u20131932018). https:\/\/doi.org\/10.1109\/ICOIN.2018.8343108","DOI":"10.1109\/ICOIN.2018.8343108"},{"key":"42_CR6","doi-asserted-by":"publisher","unstructured":"Nor, F.B.M., Abd Jalil, K.: An enhanced remote authentication scheme to mitigate man-in-the-browser attacks. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 271\u2013276 (2012). https:\/\/doi.org\/10.1109\/CyberSec.2012.6246086","DOI":"10.1109\/CyberSec.2012.6246086"},{"key":"42_CR7","doi-asserted-by":"publisher","unstructured":"Goyal, P., Bansal, N., Gupta, N.: Averting man in the browser attack using user-specific personal images. In: 2013 3rd IEEE International Advance Computing Conference (IACC), pp. 1283\u20131286 (2013). https:\/\/doi.org\/10.1109\/IAdCC.2013.6514413","DOI":"10.1109\/IAdCC.2013.6514413"},{"key":"42_CR8","doi-asserted-by":"publisher","unstructured":"Joseph, J., Bhadauria, S.: Cookie based protocol to defend malicious browser extensions. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u201362019). https:\/\/doi.org\/10.1109\/CCST.2019.8888425","DOI":"10.1109\/CCST.2019.8888425"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47451-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T18:08:26Z","timestamp":1713031706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47451-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031474507","9783031474514"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47451-4_42","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FTC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of the Future Technologies Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ftc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/FTC","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}