{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:31:04Z","timestamp":1743060664470,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319287652"},{"type":"electronic","value":"9783319287669"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28766-9_4","type":"book-chapter","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T07:09:44Z","timestamp":1451891384000},"page":"47-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modular Monitor Extensions for Information Flow Security in JavaScript"],"prefix":"10.1007","author":[{"given":"Jos\u00e9","family":"Fragoso Santos","sequence":"first","affiliation":[]},{"given":"Tamara","family":"Rezk","sequence":"additional","affiliation":[]},{"given":"Ana Almeida","family":"Matos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"key":"4_CR1","unstructured":"The 5.1th edition of ECMA 262, ECMAScript Language Specification. Technical report, ECMA 2011, June 2011"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Trustworthy Global Computing","author":"A Almeida-Matos","year":"2014","unstructured":"Almeida-Matos, A., Fragoso Santos, J., Rezk, T.: An information flow monitor for a core of DOM. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS (2009)","DOI":"10.1145\/1554339.1554353"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS (2010)","DOI":"10.1145\/1814217.1814220"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: POPL (2012)","DOI":"10.1145\/2103656.2103677"},{"key":"4_CR6","unstructured":"Banerjee, A., Naumann, D.A.: Secure information flow and pointer confinement in a java-like language. In: CSFW (2002)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bielova, N.: Survey on javascript security policies and their enforcement mechanisms in a web browser. Special Issue on Automated Specification and Verification of Web Systems of JLAP (2013)","DOI":"10.1016\/j.jlap.2013.05.001"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Chudnov, A., Naumann, D.A.: Information flow monitor inlining. In: CSF (2010)","DOI":"10.1109\/CSF.2010.21"},{"issue":"5","key":"4_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"4_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-55415-5_23","volume-title":"ICT Systems Security and Privacy Protection","author":"JF Santos","year":"2014","unstructured":"Santos, J.F., Rezk, T.: An information flow monitor-inlining compiler for securing a core of javascript. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 278\u2013292. Springer, Heidelberg (2014)"},{"key":"4_CR11","unstructured":"Gardner, P., Smith, G., Wheelhouse, M.J., Zarfaty, U.: Dom: Towards a formal specification. In: PLAN-X (2008)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Confidentiality Enforcement Using Dynamic Information Flow Analyses. Ph.D. thesis, Kansas State University (2007)","DOI":"10.1007\/978-3-540-76929-3_4"},{"key":"4_CR13","unstructured":"Guha, A., Lerner, B., Gibbs Politz, J., Krishnamurthi, S.: Web API verification: Results and challenges. In: Analysis of Security APIs (2012)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: Tracking information flow in JavaScript and its APIs. In: SAC (2014)","DOI":"10.1145\/2554850.2554909"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of javascript. In: CSF (2012)","DOI":"10.1109\/CSF.2012.19"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.cose.2011.10.002","volume":"31","author":"J Magazinius","year":"2012","unstructured":"Magazinius, J., Russo, A., Sabelfeld, A.: On-the-fly inlining of dynamic security monitors. Comput. Secur. 31, 827\u2013843 (2012)","journal-title":"Comput. Secur."},{"key":"4_CR17","unstructured":"W3C Recommendation. DOM: Document Object Model (DOM). Technical report, W3C (2005)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-04444-1_6","volume-title":"Computer Security \u2013 ESORICS 2009","author":"A Russo","year":"2009","unstructured":"Russo, A., Sabelfeld, A., Chudnov, A.: Tracking information flow in dynamic tree structures. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 86\u2013103. Springer, Heidelberg (2009)"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. J. Sel. Areas Commun. 21, 5\u201319 (2003)","journal-title":"J. Sel. Areas Commun."},{"key":"4_CR20","unstructured":"Santos, J.F., Rezk, T.: Information flow monitor-inlining compiler. \n                    http:\/\/www-sop.inria.fr\/indes\/ifJS\/"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Taly, A., Erlingsson, U., Mitchell, J.C., Miller, M.S., Nagra, J.: Automated analysis of security-critical javascript apis. In: SP (2011)","DOI":"10.1109\/SP.2011.39"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935308_24","volume-title":"Information and Communications Security","author":"VN Venkatakrishnan","year":"2006","unstructured":"Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332\u2013351. Springer, Heidelberg (2006)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Garg, D., Rajani, V., Bichhawat, A., Hammer, C.: Information Flow control for Event Handling and the DOM in Web Browsers. In: CSF (2015). to appear","DOI":"10.1109\/CSF.2015.32"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28766-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:21:27Z","timestamp":1558311687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28766-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319287652","9783319287669"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28766-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}