{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:32Z","timestamp":1775873492540,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642226540","type":"print"},{"value":"9783642226557","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22655-7_4","type":"book-chapter","created":{"date-parts":[[2011,7,18]],"date-time":"2011-07-18T13:37:43Z","timestamp":1310996263000},"page":"52-78","source":"Crossref","is-referenced-by-count":57,"title":["The Eval That Men Do"],"prefix":"10.1007","author":[{"given":"Gregor","family":"Richards","sequence":"first","affiliation":[]},{"given":"Christian","family":"Hammer","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Burg","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Vitek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"4_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/S1571-0661(04)80802-8","volume":"82","author":"C. Anderson","year":"2003","unstructured":"Anderson, C., Drossopoulou, S.: BabyJ: From Object Based to Class Based Programming via Types. Electr. Notes in Theor. Comput. Sci.\u00a082(7), 53\u201381 (2003)","journal-title":"Electr. Notes in Theor. Comput. Sci."},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.entcs.2005.09.010","volume":"138","author":"C. Anderson","year":"2005","unstructured":"Anderson, C., Giannini, P.: Type Checking for JavaScript. Electr. Notes Theor. Comput. Sci.\u00a0138(2), 37\u201358 (2005)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44898-5_1","volume-title":"Static Analysis","author":"A.S. Christensen","year":"2003","unstructured":"Christensen, A.S., M\u00f8ller, A., Schwartzbach, M.I.: Precise Analysis of String Expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694, pp. 1\u201318. Springer, Heidelberg (2003)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Chugh, R., Meister, J.A., Jhala, R., Lerner, S.: Staged Information Flow for JavaScript. In: Conference on Programming Language Design and Implementation (PLDI), pp. 50\u201362 (2009)","DOI":"10.1145\/1542476.1542483"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-02918-9_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M. Egele","year":"2009","unstructured":"Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol.\u00a05587, pp. 88\u2013106. Springer, Heidelberg (2009)"},{"key":"4_CR6","unstructured":"European Association for Standardizing Information and Communication Systems (ECMA): ECMA-262: ECMAScript Language Specification. 5th edn. (December 2009)"},{"key":"4_CR7","unstructured":"Feinstein, B., Peck, D.: Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript. In: Black Hat USA 2007 (2007)"},{"key":"4_CR8","unstructured":"Guarnieri, S., Livshits, B.: Gatekeeper: Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code. In: USENIX Security Symposium, pp. 151\u2013197 (2009)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Guha, A., Krishnamurthi, S., Jim, T.: Using Static Analysis for Ajax Intrusion Detection. In: Conference on World Wide Web (WWW), pp. 561\u2013570 (2009)","DOI":"10.1145\/1526709.1526785"},{"key":"4_CR10","first-page":"19","volume-title":"Proceedings of the Thirty-Second Australasian Conference on Computer Science, ACSC 2009","author":"A. Holkner","year":"2009","unstructured":"Holkner, A., Harland, J.: Evaluating the Dynamic Behaviour of Python Applications. In: Proceedings of the Thirty-Second Australasian Conference on Computer Science, ACSC 2009, vol.\u00a091, pp. 19\u201328. Australian Computer Society, Inc., Darlinghurst (2009)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"1930","DOI":"10.1145\/1529282.1529711","volume-title":"Proceedings of the 2009 ACM Symposium on Applied Computing, SAC 2009","author":"D. Jang","year":"2009","unstructured":"Jang, D., Choe, K.M.: Points-to Analysis for JavaScript. In: Proceedings of the 2009 ACM Symposium on Applied Computing, SAC 2009, pp. 1930\u20131937. ACM, New York (2009)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1145\/1866307.1866339","volume-title":"CCS 2010: Proceedings of the 17th ACM Conference on Computer and Communications Security","author":"D. Jang","year":"2010","unstructured":"Jang, D., Jhala, R., Lerner, S., Shacham, H.: An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications. In: CCS 2010: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 270\u2013283. ACM, New York (2010)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-03237-0_17","volume-title":"Static Analysis","author":"S.H. Jensen","year":"2009","unstructured":"Jensen, S.H., M\u00f8ller, A., Thiemann, P.: Type Analysis for JavaScript. In: Palsberg, J., Su, Z. (eds.) SAS 2009. LNCS, vol.\u00a05673, pp. 238\u2013255. Springer, Heidelberg (2009)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11575467_11","volume-title":"Programming Languages and Systems","author":"B. Livshits","year":"2005","unstructured":"Livshits, B., Whaley, J., Lam, M.S.: Reflection Analysis for Java. In: Yi, K. (ed.) APLAS 2005. LNCS, vol.\u00a03780, pp. 139\u2013160. Springer, Heidelberg (2005)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-04444-1_31","volume-title":"Computer Security \u2013 ESORICS 2009","author":"S. Maffeis","year":"2009","unstructured":"Maffeis, S., Mitchell, J.C., Taly, A.: Isolating JavaScript with Filters, Rewriting, and Wrappers. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 505\u2013522. Springer, Heidelberg (2009)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"McCarthy, J.: History of LISP. In: History of programming languages (HOPL) (1978)","DOI":"10.1145\/800025.1198360"},{"key":"4_CR17","unstructured":"Ratanaworabhan, P., Livshits, B., Zorn, B.: JSMeter: Comparing the Behavior of JavaScript Benchmarks with Real Web Applications. In: USENIX Conference on Web Application Development (WebApps) (June 2010)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Richards, G., Lebresne, S., Burg, B., Vitek, J.: An Analysis of the Dynamic Behavior of JavaScript Programs. In: Programming Language Design and Implementation Conference, PLDI (2010)","DOI":"10.1145\/1806596.1806598"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Rieck, K., Krueger, T., Dewald, A.: Cujo: Efficient Detection and Prevention of Drive-by-Download Attacks. In: Annual Computer Security Applications Conference, ACSAC (2010)","DOI":"10.1145\/1920261.1920267"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-540-31987-0_28","volume-title":"Programming Languages and Systems","author":"P. Thiemann","year":"2005","unstructured":"Thiemann, P.: Towards a Type System for Analyzing JavaScript Programs. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 408\u2013422. Springer, Heidelberg (2005)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Yue, C., Wang, H.: Characterizing Insecure JavaScript Practices on the Web. In: World Wide Web Conference, WWW (2009)","DOI":"10.1145\/1526709.1526838"}],"container-title":["Lecture Notes in Computer Science","ECOOP 2011 \u2013 Object-Oriented Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22655-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T22:30:51Z","timestamp":1560378651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22655-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226540","9783642226557"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22655-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}