{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:27Z","timestamp":1725575247386},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642181771"},{"type":"electronic","value":"9783642181788"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18178-8_18","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T11:09:47Z","timestamp":1295089787000},"page":"203-209","source":"Crossref","is-referenced-by-count":4,"title":["An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications"],"prefix":"10.1007","author":[{"given":"Elias","family":"Athanasopoulos","sequence":"first","affiliation":[]},{"given":"Antonis","family":"Krithinakis","sequence":"additional","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"LD_PRELOAD Feature. See man page of LD.SO(8)"},{"key":"18_CR2","unstructured":"SpiderMonkey (JavaScript-C) Engine, http:\/\/www.mozilla.org\/js\/spidermonkey\/"},{"key":"18_CR3","unstructured":"Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E.P.: xJS: Practical XSS Prevention for Web Application Development. In: Proceedings of the 1st USENIX WebApps Conference, Boston, US (June 2010)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-540-24852-1_21","volume-title":"Applied Cryptography and Network Security","author":"S.W. Boyd","year":"2004","unstructured":"Boyd, S.W., Keromytis, A.D.: SQLrand: Preventing SQL Injection Attacks. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 292\u2013302. Springer, Heidelberg (2004)"},{"key":"18_CR5","unstructured":"E. ECMA. 357: ECMAScript for XML (E4X) Specification. ECMA (European Association for Standardizing Information and Communication Systems), Geneva, Switzerland (2004)"},{"key":"18_CR6","unstructured":"Van Gundy, M., Chen, H.: Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11 (2009)"},{"key":"18_CR7","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1145\/1242572.1242654","volume-title":"Proceedings of the 16th International Conference on World Wide Web, WWW 2007","author":"T. Jim","year":"2007","unstructured":"Jim, T., Swamy, N., Hicks, M.: Defeating Script Injection Attacks with Browser-Enforced Embedded Policies. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 601\u2013610. ACM, New York (2007)"},{"key":"18_CR8","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1145\/948109.948146","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"G.S. Kc","year":"2003","unstructured":"Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering Code-Injection Attacks with Instruction-Set Randomization. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 272\u2013280. ACM, New York (2003)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Keromytis, A.D.: Randomized Instruction Sets and Runtime Environments Past Research and Future Directions. In: IEEE Educational Activities Department, Piscataway, NJ, USA, vol.\u00a0(1), pp. 18\u201325 (2009)","DOI":"10.1109\/MSP.2009.15"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Krithinakis, A., Athanasopoulos, E., Markatos, E.P.: Isolating JavaScript in Dynamic Code Environments. In: Proceedings of the 1st Workshop on Analysis and Programming Languages for Web Applications and Cloud Applications (APLWACA), co-located with PLDI, Toronto, Canada (June 2010)","DOI":"10.1145\/1810139.1810147"},{"key":"18_CR11","unstructured":"Nadji, Y., Saxena, P., Song, D.: Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11 (2009)"},{"key":"18_CR12","volume-title":"Proceedings of the 8th ACM\/IFIP\/USENIX International Conference on Middleware","author":"S. Nanda","year":"2007","unstructured":"Nanda, S., Lam, L.C., Chiueh, T.: Dynamic Multi-Process Information Flow Tracking for Web Application Security. In: Proceedings of the 8th ACM\/IFIP\/USENIX International Conference on Middleware. ACM, New York (2007)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Nguyen-tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically Hardening Web Applications Using Precise Tainting. In: Proceedings of the 20th IFIP International Information Security Conference, pp. 372\u2013382 (2005)","DOI":"10.1007\/0-387-25660-1_20"},{"key":"18_CR14","unstructured":"SANS Insitute. The Top Cyber Security Risks (September 2009), http:\/\/www.sans.org\/top-cyber-security-risks\/"},{"key":"18_CR15","unstructured":"Sekar, R.: An Efficient Black-box Technique for Defeating Web Application Attacks. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11 (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18178-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T08:20:43Z","timestamp":1637137243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18178-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642181771","9783642181788"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18178-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}