{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:46:05Z","timestamp":1743011165853,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_22","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T03:40:02Z","timestamp":1453520402000},"page":"401-417","source":"Crossref","is-referenced-by-count":1,"title":["Why Web Servers Should Fear Their Clients"],"prefix":"10.1007","author":[{"given":"Juan D. Parra","family":"Rodriguez","sequence":"first","affiliation":[]},{"given":"Joachim","family":"Posegga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Introducing the new HTML5 Hard Disk Filler API (2013). http:\/\/feross.org\/fill-disk\/"},{"key":"22_CR2","unstructured":"MD5-Password-Cracker (2013). https:\/\/github.com\/feross\/md5-password-cracker.js\/"},{"key":"22_CR3","unstructured":"The top 500 sites on the web (2015). http:\/\/www.alexa.com\/topsites"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Antonatos, S., Akritidis, P., Lam, V.T., Anagnostakis, K.G.: Puppetnets: Misusing Web Browsers As a Distributed Attack Infrastructure. ACM Trans. Inf. Syst. Secur. 12(2) (2008)","DOI":"10.1145\/1455518.1477941"},{"key":"22_CR5","unstructured":"Using Baidu to steer millions of computers to launch denial of serviceattacks (2015). https:\/\/drive.google.com\/file\/d\/0ByrxblDXR_yqeUNZYU5WcjFCbXM\/view"},{"key":"22_CR6","unstructured":"Web code weakness allows data dump on PCs (2008). http:\/\/www.bbc.co.uk\/news\/technology-21628622"},{"key":"22_CR7","unstructured":"Bitcoin Miner for Websites (2011). http:\/\/www.bitcoinplus.com\/miner\/embeddable"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and analysis of drive-by-download attacks and malicious javascript code. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 281\u2013290. ACM, New York (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-31680-7_13","volume-title":"Privacy Enhancing Technologies","author":"D Fifield","year":"2012","unstructured":"Fifield, D., Hardison, N., Ellithorpe, J., Stark, E., Boneh, D., Dingledine, R., Porras, P.: Evading censorship with browser-based proxies. In: Fischer-H\u00fcbner, Simone, Wright, Matthew (eds.) PETS 2012. LNCS, vol. 7384, pp. 239\u2013258. Springer, Heidelberg (2012)"},{"key":"22_CR10","unstructured":"SynGUI (2014). http:\/\/download.cnet.com\/SynGUI\/3000-18510_4-10915777.html"},{"key":"22_CR11","unstructured":"Grossman, J., Johansen, M.: Million Browser Botnet (2013). https:\/\/www.blackhat.com\/us-13\/briefings.html"},{"key":"22_CR12","unstructured":"Hickson, I.: Web workers. Candidate recommendation, W3C, May 2012. http:\/\/www.w3.org\/TR\/2012\/CR-workers-20120501\/"},{"key":"22_CR13","unstructured":"Huang, L.S., Chen, E.Y., Barth, A., Rescorla, E., Jackson, C.: Talking to yourself for fun and profit. In: Proceedings of W2SP, pp. 1\u201311 (2011)"},{"key":"22_CR14","unstructured":"Kesteren, A.V.: Cross-Origin Resource Sharing. W3C recommendation, W3C, January 2014. http:\/\/www.w3.org\/TR\/2014\/REC-cors-20140116\/"},{"issue":"6","key":"22_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5120\/14119-2221","volume":"82","author":"A Kulshrestha","year":"2013","unstructured":"Kulshrestha, A.: An Empirical study of HTML5 Websockets and their Cross Browser behavior for Mixed Content and Untrusted Certificates. International Journal of Computer Applications 82(6), 13\u201318 (2013)","journal-title":"International Journal of Computer Applications"},{"key":"22_CR16","unstructured":"Kuppan, L., Saindane, M.: JS Recon (2010). http:\/\/www.andlabs.org\/tools\/jsrecon\/jsrecon.html"},{"key":"22_CR17","unstructured":"Linux Programmer\u2019s Manual (2015). http:\/\/man7.org\/linux\/man-pages\/man2\/select.2.html"},{"key":"22_CR18","unstructured":"A Network Stress Testing Application (2014). https:\/\/sourceforge.net\/projects\/loic\/"},{"key":"22_CR19","unstructured":"Matthews, N.: jsMiner (2011). https:\/\/github.com\/jwhitehorn\/jsMiner"},{"key":"22_CR20","unstructured":"Matthews, N.: Ravan: JavaScript Distributed Computing System (BETA) (2012). http:\/\/www.andlabs.org\/tools\/ravan.html"},{"key":"22_CR21","unstructured":"Melnikov, A.: The websocket protocol. RFC 6455, RFC Editor, December 2011. http:\/\/tools.ietf.org\/html\/rfc6455"},{"key":"22_CR22","unstructured":"Rice, A.: Chromium Code Reviews Issue 835623003: Add a delay when unlockingWebSocket endpoints. (Closed) (2015). https:\/\/codereview.chromium.org\/835623003"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Rieck, K., Krueger, T., Dewald, A.: Cujo: efficient detection and prevention of drive-by-download attacks. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 31\u201339. ACM, Austin (2010)","DOI":"10.1145\/1920261.1920267"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Sch\u00fctt, K., Kloft, M., Bikadorov, A., Rieck, K.: Early detection of malicious behavior in JavaScript code. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, pp. 15\u201324. ACM, Raileigh (2012)","DOI":"10.1145\/2381896.2381901"},{"key":"22_CR25","unstructured":"Web Server Usage Statistics (2015). http:\/\/trends.builtwith.com\/web-server"},{"key":"22_CR26","unstructured":"Shema, M., Shekyan, S., Toukharia, V.: Hacking with WebSockets (2012). http:\/\/media.blackhat.com\/bh-us-12\/Briefings\/Shekyan\/BH_US_12_Shekyan_Toukharian_Hacking_Websocket_Slides.pdf"},{"key":"22_CR27","unstructured":"Internet activists blame China for cyber-attack that brought down GitHub (2015). http:\/\/www.theguardian.com\/technology\/2015\/mar\/30\/china-github-internet-activists-cyber-attack"},{"key":"22_CR28","unstructured":"Browser Statistics (2014). http:\/\/www.w3schools.com\/browsers\/browsers_stats.asp"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:23:15Z","timestamp":1498263795000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}