{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:18Z","timestamp":1725845658076},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_25","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"354-363","source":"Crossref","is-referenced-by-count":9,"title":["A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites"],"prefix":"10.1007","author":[{"given":"Ping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Nick","family":"Nikiforakis","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Huygens","sequence":"additional","affiliation":[]},{"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"25_CR1","unstructured":"Add support for Mixed Content Blocking - Android. \n                      https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=860581"},{"key":"25_CR2","unstructured":"BeEF - The Browser Exploitation Framework Project. \n                      http:\/\/beefproject.com\/"},{"key":"25_CR3","unstructured":"Bing Search API. \n                      http:\/\/datamarket.azure.com\/dataset\/bing\/search"},{"key":"25_CR4","unstructured":"\u201cOnly secure content is displayed\u201d notification in internet explorer 9 or later. \n                      http:\/\/support.microsoft.com\/kb\/2625928"},{"key":"25_CR5","unstructured":"SSL Pulse. \n                      https:\/\/www.trustworthyinternet.org\/ssl-pulse\/"},{"key":"25_CR6","unstructured":"StatCounter. \n                      http:\/\/statcounter.com\/"},{"key":"25_CR7","unstructured":"Internet Explorer 8 Mixed Content Handling (2009). \n                      http:\/\/msdn.microsoft.com\/en-us\/library\/ee264315(v=vs.85).aspx"},{"key":"25_CR8","unstructured":"Ending mixed scripting vulnerabilities (2012). \n                      http:\/\/blog.chromium.org\/2012\/08\/ending-mixed-scripting-vulnerabilities.html"},{"key":"25_CR9","unstructured":"Mixed content blocking enabled in firefox 23! (2013). \n                      https:\/\/blog.mozilla.org\/tanvi\/2013\/04\/10\/mixed-content-blocking-enabled-in-firefox-23\/"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Al Fardan, N.J., Paterson, K.G.: Lucky Thirteen: breaking the TLS and DTLS record protocols. In: IEEE Symposium on Security and Privacy, SP 2013, pp. 526\u2013540 (2013)","DOI":"10.1109\/SP.2013.42"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-33383-5_6","volume-title":"Information Security","author":"C Amrutkar","year":"2012","unstructured":"Amrutkar, C., Traynor, P., van Oorschot, P.C.: Measuring SSL indicators on mobile browsers: extended life, or end of the road? In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 86\u2013103. Springer, Heidelberg (2012)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 75\u201388. ACM, New York, NY, USA (2008)","DOI":"10.1145\/1455770.1455782"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Clark, J., van Oorschot, P.C.: SoK: SSL and HTTPS: revisiting past challenges and evaluating certificate trust model enhancements. In: IEEE Symposium on Security and Privacy, SP 2013, pp. 511\u2013525 (2013)","DOI":"10.1109\/SP.2013.41"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Heiderich, M., Niemietz, M., Schuster, F., Holz, T., Schwenk, J.: Scriptless attacks: stealing the pie without touching the sill. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 760\u2013771. ACM, New York, NY, USA (2012)","DOI":"10.1145\/2382196.2382276"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Hodges, J., Jackson, C., Barth, A.: HTTP strict transport security (HSTS), IETF RFC (2012)","DOI":"10.17487\/rfc6797"},{"key":"25_CR16","unstructured":"Marlinspike, M.: New Tricks for Defeating SSL in Practice, Blackhat (2009)"},{"key":"25_CR17","unstructured":"McAfee. TrustedSource Web Database. \n                      https:\/\/www.trustedsource.org\/en\/feedback\/url"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Invernizzi, L., Kapravelos, A., van Acker, S., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: You are what you include: large-scale evaluation of remote javascript inclusions. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 736\u2013747. ACM, New York, NY, USA (2012)","DOI":"10.1145\/2382196.2382274"},{"key":"25_CR19","unstructured":"Rizzo, J., Duong, T.: Crime: Compression ratio info-leak made easy. In: ekoparty Security Conference (2012)"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Stamm, S., Sterne, B., Markham, G.: Reining in the web with content security policy. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 921\u2013930. ACM, New York, NY, USA (2010)","DOI":"10.1145\/1772690.1772784"},{"key":"25_CR21","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying Wolf: an empirical study of SSL warning effectiveness. In: Proceedings of the 18th Usenix Security Symposium, pp. 399\u2013416 (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:54:27Z","timestamp":1559357667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}