{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:03:49Z","timestamp":1743069829473,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540893295"},{"type":"electronic","value":"9783540893301"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89330-1_23","type":"book-chapter","created":{"date-parts":[[2008,11,27]],"date-time":"2008-11-27T02:43:37Z","timestamp":1227753817000},"page":"326-341","source":"Crossref","is-referenced-by-count":17,"title":["JavaScript Instrumentation in Practice"],"prefix":"10.1007","author":[{"given":"Haruka","family":"Kikuchi","sequence":"first","affiliation":[]},{"given":"Dachuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ajay","family":"Chander","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Inamura","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Serikov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Apple Inc. Safari mobile on iphone, http:\/\/www.apple.com\/iphone\/internet\/"},{"key":"23_CR2","unstructured":"Christey, S., Martin, R.A.: Vulnerability type distributions in CVE (2007), http:\/\/cve.mitre.org\/"},{"key":"23_CR3","unstructured":"ECMA International. ECMAScript language specification. Standard ECMA-262, 3rd Edition (December 1999)"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: Proc. 1999 New Security Paradigms Workshop, Caledon Hills, Ontario, Canada, pp. 87\u201395 (September 1999)","DOI":"10.1145\/335169.335201"},{"key":"23_CR5","unstructured":"Erlingsson, U., Schneider, F.B.: IRM enforcement of Java stack inspection. In: Proc. IEEE S&P (2000)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Evans, D., Twyman, A.: Flexible policy-directed code safety. In: Proc. 20th IEEE S&P, pp. 32\u201347 (1999)","DOI":"10.1109\/SECPRI.1999.766716"},{"key":"23_CR7","unstructured":"Hewitt, J.: Firebug\u2014web development evolved, http:\/\/www.getfirebug.com\/"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Kiciman, E., Livshits, B.: AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications. In: Proc. SOSP 2007, pp. 17\u201330 (2007)","DOI":"10.1145\/1323293.1294264"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Kikuchi, H., Yu, D., Chander, A., Inamura, H., Serikov, I.: Javascript instrumentation in practice. Technical Report DCL-TR-2008-0053, DoCoMo USA Labs (June 2008), http:\/\/www.docomolabsresearchers-usa.com\/~dyu\/jiip-tr.pdf","DOI":"10.1007\/978-3-540-89330-1_23"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution for mitigating cross-site scripting attacks. In: Proc. 2006 ACM Symposium on Applied Computing, pp. 330\u2013337 (2006)","DOI":"10.1145\/1141277.1141357"},{"key":"23_CR11","unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.P.: Secure execution via program shepherding. In: Proc. 11th USENIX Security Symposium, pp. 191\u2013206 (2002)"},{"issue":"2","key":"23_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J. Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security\u00a04(2), 2\u201316 (2005)","journal-title":"International Journal of Information Security"},{"key":"23_CR13","unstructured":"Luotonen, A.: Tunneling TCP based protocols through web proxy servers. IETF RFC 2616 (1998)"},{"key":"23_CR14","unstructured":"OWASP Foundation. The ten most critical web application security vulnerabilities (2007), http:\/\/www.owasp.org\/"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Reis, C., Dunagan, J., Wang, H.J., Dubrovsky, O., Esmeir, S.: BrowserShield: Vulnerability-driven filtering of dynamic HTML. In: Proc. OSDI 2006, Seattle, WA (2006)","DOI":"10.1145\/1281480.1281481"},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. Trans. on Information & System Security\u00a03(1), 30\u201350 (2000)","journal-title":"Trans. on Information & System Security"},{"key":"23_CR17","unstructured":"van Kesteren, A., Jackson, D.: The XMLHttpRequest object. W3C working draft (2006), http:\/\/www.w3.org\/TR\/XMLHttpRequest\/"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: Proc. SOSP 1993, Asheville, NC, pp. 203\u2013216 (1993)","DOI":"10.1145\/173668.168635"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Yu, D., Chander, A., Islam, N., Serikov, I.: JavaScript instrumentation for browser security. In: Proc. POPL 2007, Nice, France, pp. 237\u2013249 (January 2007)","DOI":"10.1145\/1190215.1190252"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89330-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T17:37:58Z","timestamp":1738690678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89330-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893295","9783540893301"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89330-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}