{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T04:01:53Z","timestamp":1750564913046,"version":"3.41.0"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_95","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"941-951","source":"Crossref","is-referenced-by-count":1,"title":["RTF Editor XSS Fuzz Framework"],"prefix":"10.1007","author":[{"given":"Jun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Qiyi","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"95_CR1","unstructured":"Williams, J., Wichers, D.: OWASP top 10-2013. OWASP Foundation (2013)"},{"key":"95_CR2","doi-asserted-by":"crossref","unstructured":"Johns, M., Engelmann, B., Posegga, J.: XSSDS: server-side detection of cross-site scripting attacks. In: Computer Security Applications Conference, ACSAC 2008, Annual, pp. 335\u2013344. IEEE (2008)","DOI":"10.1109\/ACSAC.2008.36"},{"key":"95_CR3","unstructured":"Klein, A.: DOM based cross site scripting or XSS of the third kind. In: Web Application Security Consortium, Articles, vol. 4 (2005)"},{"key":"95_CR4","first-page":"9","volume":"2014","author":"MK Gupta","year":"2014","unstructured":"Gupta, M.K., Govil, M.C., Singh, G.: Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: a survey. Recent Adv. Innov. Eng. (ICRAIE) 2014, 9\u201311 (2014)","journal-title":"Recent Adv. Innov. Eng. (ICRAIE)"},{"key":"95_CR5","doi-asserted-by":"crossref","unstructured":"Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: a static analysis tool for detecting web application vulnerabilities. In: Proceedings of the IEEE Symposium on Security and Privacy, May 2006","DOI":"10.1109\/SP.2006.29"},{"key":"95_CR6","doi-asserted-by":"crossref","unstructured":"Doup\u00e9, A., Cova, M., Vigna, G.: Why johnny can\u2019t pentest: an analysis of black- box web vulnerability scanners. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 111\u2013131. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14215-4_7"},{"key":"95_CR7","doi-asserted-by":"crossref","unstructured":"Vieira, M., Antunes, N., Madeira, H.: Using web security scanners to detect vulnerabilities in web services. In: IEEE\/IFIP DSN, pp. 566\u2013571, June 2009","DOI":"10.1109\/DSN.2009.5270294"},{"key":"95_CR8","doi-asserted-by":"crossref","unstructured":"Duchene, F., Groz, R., Rawat, S., Richier, J.-L.: XSS vulnerability detection using model inference assisted evolutionary fuzzing. In: 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, vol. 2, pp. 815\u2013817 (2012)","DOI":"10.1109\/ICST.2012.181"},{"key":"95_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wang, X., Wang, P., Liu, L.: Detecting cross site scripting vulnerabilities introduced by HTML5. In: 2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 319\u2013323 (2014)","DOI":"10.1109\/JCSSE.2014.6841888"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_95","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T04:18:26Z","timestamp":1750479506000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_95"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_95","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}