{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:53:43Z","timestamp":1743033223753,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044434"},{"type":"electronic","value":"9783642044441"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_31","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:34:44Z","timestamp":1252953284000},"page":"505-522","source":"Crossref","is-referenced-by-count":17,"title":["Isolating JavaScript with Filters, Rewriting, and Wrappers"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Maffeis","sequence":"first","affiliation":[]},{"given":"John C.","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Ankur","family":"Taly","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-68237-0_19","volume-title":"FM 2008: Formal Methods","author":"I. Aktug","year":"2008","unstructured":"Aktug, I., Dam, M., Gurov, D.: Provably correct runtime monitoring. In: Cuellar, J., Maibaum, T., Sere, K. (eds.) FM 2008. LNCS, vol.\u00a05014, pp. 262\u2013277. Springer, Heidelberg (2008)"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/11531142_19","volume-title":"ECOOP 2005 - Object-Oriented Programming","author":"C. Anderson","year":"2005","unstructured":"Anderson, C., Giannini, P., Drossopoulou, S.: Towards type inference for JavaScript. In: Black, A.P. (ed.) ECOOP 2005. LNCS, vol.\u00a03586, pp. 429\u2013452. Springer, Heidelberg (2005)"},{"key":"31_CR3","unstructured":"Barth, A., Jackson, C., Mitchell, J.C.: Securing browser frame communication. In: 17th USENIX Security Symposium (2008)"},{"key":"31_CR4","unstructured":"Google Caja Team. Google-Caja: A source-to-source translator for securing JavaScript-based web, http:\/\/code.google.com\/p\/google-caja\/"},{"key":"31_CR5","unstructured":"Crockford, D.: ADsafe: Making JavaScript safe for advertising (2008), http:\/\/www.adsafe.org\/"},{"key":"31_CR6","unstructured":"Eich, B.: JavaScript at ten years, http:\/\/www.mozilla.org\/js\/language\/ICFP-Keynote.ppt"},{"key":"31_CR7","unstructured":"FaceBook, http:\/\/www.facebook.com\/"},{"key":"31_CR8","volume-title":"JavaScript: The Definitive Guide","author":"D. Flanagan","year":"2006","unstructured":"Flanagan, D.: JavaScript: The Definitive Guide. O\u2019Reilly, Sebastopol (2006), http:\/\/proquest.safaribooksonline.com\/0596101996"},{"key":"31_CR9","unstructured":"Heidegger, P., Thiemann, P.: Recency types for dynamically-typed, object-based languages. In: Foundations of Object-Oriented Languages, FOOL 2009 (2009)"},{"key":"31_CR10","unstructured":"iGoogle, http:\/\/www.google.com\/ig"},{"key":"31_CR11","unstructured":"ECMA International. ECMAScript language specification. stardard ECMA-262, 3rd edn. (1999), http:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST\/Ecma-262.pdf"},{"key":"31_CR12","unstructured":"Livshits, B., Guarnieri, S.: Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code. MSR-TR-2009-16 (February 2009)"},{"key":"31_CR13","unstructured":"Maffeis, S., Mitchell, J., Taly, A.: Complete ECMA 262-3 operational semantics, http:\/\/jssec.net\/semantics\/"},{"key":"31_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-540-89330-1_22","volume-title":"Programming Languages and Systems","author":"S. Maffeis","year":"2008","unstructured":"Maffeis, S., Mitchell, J.C., Taly, A.: An operational semantics for JavaScript. In: Ramalingam, G. (ed.) APLAS 2008. LNCS, vol.\u00a05356, pp. 307\u2013325. Springer, Heidelberg (2008)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Maffeis, S., Mitchell, J.C., Taly, A.: Isolating JavaScript with filters, rewriting, and wrappers. Dep. of Computing, Imperial College London, Technical Report DTR09-6 (2009)","DOI":"10.1007\/978-3-642-04444-1_31"},{"key":"31_CR16","unstructured":"Maffeis, S., Mitchell, J.C., Taly, A.: Run-time enforcement of untrusted javascript subsets. In: Web 2.0 Security & Privacy, W2SP (2009)"},{"key":"31_CR17","volume-title":"Proc. of CSF 2009","author":"S. Maffeis","year":"2009","unstructured":"Maffeis, S., Taly, A.: Language-based isolation of untrusted Javascript. In: Proc. of CSF 2009. IEEE, Los Alamitos (2009); See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3 (2009)"},{"key":"31_CR18","unstructured":"OpenSocial, http:\/\/www.opensocial.org\/"},{"key":"31_CR19","volume-title":"ASIACCS 2009","author":"D. Sands","year":"2009","unstructured":"Sands, D., Phung, P.H., Chudnov, A.: Lightweight self protecting JavaScript. In: ASIACCS 2009. ACM Press, New York (2009)"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jlap.2004.03.009","volume":"60-61","author":"G.D. Plotkin","year":"2004","unstructured":"Plotkin, G.D.: A structural approach to operational semantics. J. Log. Algebr. Program.\u00a060-61, 117\u2013139 (2004)","journal-title":"J. Log. Algebr. Program."},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Reis, C., Dunagan, J., Wang, H., Dubrovsky, O., Esmeir, S.: BrowserShield: Vulnerability-driven filtering of Dynamic HTML. ACM Transactions on the Web\u00a01(3) (2007)","DOI":"10.1145\/1281480.1281481"},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Askarov, A.: Tight enforcement of flexible information-release policies for dynamic languages. In: Second International Workshop on Proof-Carrying Code 2008 (2008)","DOI":"10.1109\/CSF.2009.22"},{"key":"31_CR23","unstructured":"The FaceBook Team. FBJS, http:\/\/wiki.developers.facebook.com\/index.php\/FBJS"},{"key":"31_CR24","unstructured":"The FaceBook Team. FBML, http:\/\/wiki.developers.facebook.com\/index.php\/FBML"},{"key":"31_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-540-31987-0_28","volume-title":"Programming Languages and Systems","author":"P. Thiemann","year":"2005","unstructured":"Thiemann, P.: Towards a type system for analyzing javascript programs. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 408\u2013422. Springer, Heidelberg (2005)"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Thiemann, P.: A type safe DOM API. In: Proc. of DBPL, pp. 169\u2013183 (2005)","DOI":"10.1007\/11601524_11"},{"key":"31_CR27","unstructured":"Vikram, K., Steiner, M.: Mashup component isolation via server-side analysis and instrumentation. In: Web 2.0 Security & Privacy, W2SP (2008)"},{"key":"31_CR28","unstructured":"YahooApp., http:\/\/developer.yahoo.com\/yap\/"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Yu, D., Chander, A., Islam, N., Serikov, I.: JavaScript instrumentation for browser security. In: Proc. of POPL 2007, pp. 237\u2013249 (2007)","DOI":"10.1145\/1190215.1190252"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T19:10:56Z","timestamp":1685128256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}