{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:26:53Z","timestamp":1725906413473},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319647005"},{"type":"electronic","value":"9783319647012"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_7","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:56:55Z","timestamp":1500973015000},"page":"87-98","source":"Crossref","is-referenced-by-count":0,"title":["CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy"],"prefix":"10.1007","author":[{"given":"Somanath","family":"Tripathy","sequence":"first","affiliation":[]},{"given":"Praveen","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"7_CR1","unstructured":"Cenzic-Inc: Application vulnerability trends report: 2014. \nhttps:\/\/www.info-point-security.com\/sites\/default\/files\/cenzic-vulnerability-report-2014.pdf"},{"key":"7_CR2","unstructured":"Barth, A.: Http state management mechanism. RFC 6265, RFC Editor, April 2011. \nhttp:\/\/www.rfc-editor.org\/rfc\/rfc6265.txt"},{"key":"7_CR3","unstructured":"Baloch, R.: Bypassing browser security policies for fun and profit. Black Hat Asia 2016 (2016)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bates, D., Barth, A., Jackson, C.: Regular expressions considered harmful in client-side XSS filters. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 91\u2013100. ACM, New York (2010)","DOI":"10.1145\/1772690.1772701"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Adida, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, pp. 517\u2013524. ACM, New York (2008)","DOI":"10.1145\/1367497.1367568"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: exploring the ecosystem of web-based device fingerprinting. In: 2013 IEEE Symposium on Security and Privacy, pp. 541\u2013555, May 2013","DOI":"10.1109\/SP.2013.43"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-19125-1_7","volume-title":"Engineering Secure Software and Systems","author":"N Nikiforakis","year":"2011","unstructured":"Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: SessionShield: lightweight protection against session hijacking. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 87\u2013100. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-19125-1_7"},{"key":"7_CR8","unstructured":"Why aren\u2019t HTTP-only cookies more widely deployed? In: Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP) 2010 (2010)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-41488-6_3","volume-title":"Secure IT Systems","author":"W Burgers","year":"2013","unstructured":"Burgers, W., Verdult, R., Eekelen, M.: Prevent session hijacking by binding the session to the cryptographic network credentials. In: Riis Nielson, H., Gollmann, D. (eds.) NordSec 2013. LNCS, vol. 8208, pp. 33\u201350. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-41488-6_3"},{"key":"7_CR10","first-page":"2623","volume":"7","author":"A Muhammad","year":"2012","unstructured":"Muhammad, A., Tripathi, N.: Evaluation of OpenID-based double-factor authentication for preventing session hijacking in web applications. J. Comput. 7, 2623\u20132628 (2012)","journal-title":"J. Comput."},{"key":"7_CR11","unstructured":"Google: Top 10,000 English determined by Google\u2019s trillion word corpus. \nhttps:\/\/github.com\/first20hours\/google-10000-english"},{"key":"7_CR12","unstructured":"Alexa: Top 1,000,000 website list from alexa. \nhttp:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:59:59Z","timestamp":1500973199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}