{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:04:30Z","timestamp":1767261870850},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540736134"},{"type":"electronic","value":"9783540736141"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73614-1_1","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:09:45Z","timestamp":1189652985000},"page":"1-19","source":"Crossref","is-referenced-by-count":19,"title":["Extensible Web Browser Security"],"prefix":"10.1007","author":[{"given":"Mike","family":"Ter Louw","sequence":"first","affiliation":[]},{"given":"Jin Soon","family":"Lim","sequence":"additional","affiliation":[]},{"given":"V. N.","family":"Venkatakrishnan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Information from http:\/\/en.wikipedia.org\/wiki\/Mozilla_Firefox"},{"key":"1_CR2","unstructured":"Information from http:\/\/addons.mozilla.org"},{"key":"1_CR3","unstructured":"Project website. http:\/\/research.mike.tl\/view\/Research\/ExtensibleWebBrowserSecurity"},{"key":"1_CR4","unstructured":"Protected mode in vista ie7. http:\/\/blogs.msdn.com\/ie\/archive\/2006\/02\/09\/528963.aspx"},{"key":"1_CR5","unstructured":"eTrust Pest\u00a0Patrol. Pests detected by pestpatrol and classified as browser helper object http:\/\/www.pestpatrol.com\/pestinfo2005"},{"key":"1_CR6","unstructured":"Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A secure environment for untrusted helper applications: confining the wily hacker. In: USENIX Security Symposium (1996)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Hallaraker, O., Vigna, G.: Detecting Malicious JavaScript Code in Mozilla. In: Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 85\u201394, Shanghai, China (June 2005)","DOI":"10.1109\/ICECCS.2005.35"},{"key":"1_CR8","unstructured":"Kirk, J.: Trojan cloaks itself as firefox extension. Infoworld magazine (July 2006)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Lampson, B.W.: A note on the confinement problem. Communications of the ACM\u00a016(10) (1973)","DOI":"10.1145\/362375.362389"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/263699.263712","volume-title":"ACM Symposium on Principles of Programming Languages (POPL)","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-carrying code (ACM SIGACT and SIGPLAN). In: ACM Symposium on Principles of Programming Languages (POPL), pp. 106\u2013119. ACM Press, New York (1997)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Reis, C., Dunagan, J., Wang, H., Dubrovsky, O., Esmeir, S.: Browsershield: Vulnerability-driven filtering of dynamic html. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006)","DOI":"10.1145\/1281480.1281481"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model carrying code: A practical approach for safe execution of untrusted applications. In: ACM Symposium on Operating Systems Principles (SOSP) (2003)","DOI":"10.1145\/945445.945448"},{"key":"1_CR13","unstructured":"Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross site scripting prevention with dynamic data tainting and static analysis. In: Network and Distributed System Security Symposium (NDSS), San Diego (2007)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T., Graham, S.: Efficient software-based fault isolation. In: Proceedings of the Symposium of Operating System Principles (1993)","DOI":"10.1145\/168619.168635"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73614-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T01:30:40Z","timestamp":1556847040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73614-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540736134","9783540736141"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73614-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}