{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:04:59Z","timestamp":1743077099083,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319027258"},{"type":"electronic","value":"9783319027265"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-02726-5_3","type":"book-chapter","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T09:39:17Z","timestamp":1383125957000},"page":"33-48","source":"Crossref","is-referenced-by-count":5,"title":["Defeat Information Leakage from Browser Extensions via Data Obfuscation"],"prefix":"10.1007","author":[{"given":"Wentao","family":"Chang","sequence":"first","affiliation":[]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Firefox web browser, \n                    \n                      http:\/\/www.mozilla.com\/en-US\/firefox\/firefox.html"},{"key":"3_CR2","unstructured":"QhaoserHq, an open-source attack toolkit for Facebook, \n                    \n                      http:\/\/userscripts.org\/scripts\/review\/140659"},{"key":"3_CR3","unstructured":"Chrome browser features, \n                    \n                      https:\/\/www.google.com\/intl\/en\/chrome\/browser\/features.html"},{"key":"3_CR4","unstructured":"Barth, A., Jackson, C., Reis, C., Team, T.G.C.: The security architecture of the chromium browser. In Stanford Technical Report (2008)"},{"key":"3_CR5","unstructured":"Barth, A.: More secure extensions, by default (February 2012), \n                    \n                      http:\/\/blog.chromium.org\/2012\/02\/more-secure-extensions-by-default.html"},{"key":"3_CR6","unstructured":"Carlini, N., Felt, A.P., Wagner, D.: An Evaluation of the Google Chrome Extension security architecture. In: Proc. of the 21st USENIX Security Symposium (2012)"},{"key":"3_CR7","unstructured":"Liu, L., Zhang, X., Yan, G., Chen, S.: Chrome Extensions: Threat Analysis and Countermeasures. In: Network and Distributed System Security Symposium, NDSS (2012)"},{"key":"3_CR8","unstructured":"Djeric, V., Goel, A.: Securing script-based extensibility in web browsers. In: Proc. of the 19th USENIX Security Symposium (2010)"},{"key":"3_CR9","unstructured":"Jetpack, \n                    \n                      https:\/\/jetpack.mozillalabs.com\/"},{"key":"3_CR10","unstructured":"Barth, A., Felt, A.P., Saxena, P., Boodman, A.: Protecting browsers from extension vulnerabilities. In: Proc. of Network and Distributed System Security Symposium, NDSS (2010)"},{"key":"3_CR11","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The Effectiveness of Application Permissions. In: USENIX Conference on Web Application Development, WebApps (2011)"},{"key":"3_CR12","unstructured":"Chrome extensions flaw allows password theft, \n                    \n                      http:\/\/www.pcpro.co.uk\/news\/security\/359362\/chrome-extensions-flaw-allows-password-theft"},{"key":"3_CR13","unstructured":"Chromium blog. A year of extensions, \n                    \n                      http:\/\/blog.chromium.org\/2010\/12\/year-of-extensions.html"},{"key":"3_CR14","unstructured":"Wuest, C., Florio, E.: Firefox and Malware: When Browsers Attack (2009), \n                    \n                      http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_response\/whitepapers\/firefox_and_malware.pdf"},{"key":"3_CR15","unstructured":"Assolini, F.: Think twice before installing Chrome extensions, \n                    \n                      http:\/\/www.securelist.com\/en\/blog\/208193414\/Think_twice_before_installing_Chrome_extensions"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Ganapathy, V.: Analyzing information flow in JavaScript-based browser extensions. In: Proc. of Annual Computer Security Applications Conference (2009)","DOI":"10.1109\/ACSAC.2009.43"},{"key":"3_CR17","unstructured":"Rogue Chrome Extension racks up Facebook \u201clikes\u201d for online bandits, \n                    \n                      http:\/\/www.pcworld.com\/article\/2028614\/rogue-chrome-extension-racks-up-facebook-likes-for-online-bandits.html"},{"key":"3_CR18","unstructured":"Health information privacy, \n                    \n                      http:\/\/www.hhs.gov\/ocr\/privacy\/"},{"key":"3_CR19","unstructured":"Chesapeake irb, \n                    \n                      http:\/\/chesapeakeirb.com\/"},{"key":"3_CR20","unstructured":"Liverani, R.S., Freeman, N.: Abusing Firefox extensions. In Defcon 17 (2009), \n                    \n                      https:\/\/www.defcon.org\/images\/defcon-17\/dc-17-presentations\/defcon-17-roberto_liverani-nick_freeman-abusing_firefox.pdf"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-642-31057-7_16","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"R. Karim","year":"2012","unstructured":"Karim, R., Dhawan, M., Ganapathy, V., Shan, C.-C.: An Analysis of the Mozilla Jetpack Extension Framework. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol.\u00a07313, pp. 333\u2013355. Springer, Heidelberg (2012)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Bandhakavi, S., King, S.T., Madhusudan, P., Winslett, M.: Vex: Vetting browser extensions for security vulnerabilities. In: Proc. of the 19th USENIX Security Symposium (2010)","DOI":"10.1145\/1995376.1995398"},{"key":"3_CR23","unstructured":"Guarnieri, S., Livshits, B.: GATEKEEPER: mostly static enforcement of security and reliability policies for JavaScript code. In: Proc. of the 18th Conference on USENIX Security Symposium (2009)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Martin Jr., D.M., Smith, R.M., Brittain, M., Fetch, I., Wu, H.: The privacy practices of web browser extensions. Communications of the ACM (2001)","DOI":"10.1145\/359205.359226"},{"key":"3_CR25","unstructured":"Facebook scammers host Trojan horse extensions on the Chrome web store, \n                    \n                      http:\/\/www.pcworld.com\/article\/252533\/facebook_scammers_host_trojan_horse_extensions_on_the_chrome_web_store.html"},{"key":"3_CR26","unstructured":"Kotowicz, K., Osborn, K.: Advanced Chrome extension exploitation leveraging API powers for better evil. Black Hat, USA (2012)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02726-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:25:41Z","timestamp":1566764741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02726-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319027258","9783319027265"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02726-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}