{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:45:08Z","timestamp":1725597908400},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_71","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:01:51Z","timestamp":1311595311000},"page":"685-692","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers"],"prefix":"10.1007","author":[{"given":"Tanusha S.","family":"Nadkarni","sequence":"first","affiliation":[]},{"given":"Radhesh","family":"Mohandas","sequence":"additional","affiliation":[]},{"given":"Alwyn R.","family":"Pais","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"71_CR1","unstructured":"Banking Trojan Captures User\u2019s Screen in Video Clip, Hispasec\/VirusTotal (September 05, 2006), \n                    \n                      http:\/\/www.hispasec.com\/laboratorio\/banking_trojan_capture_video_clip.pdf"},{"key":"71_CR2","unstructured":"New technique against virtual keyboards, Hispasec\/VirusTotal, Hispasec \/ VirusTotal (September 26, 2006), \n                    \n                      http:\/\/www.hispasec.com\/laboratorio\/New_technique_against_virtual_keyboards.pdf"},{"key":"71_CR3","unstructured":"Debasis Mohanty: Defeating Virtual Keyboard Protection, \n                    \n                      http:\/\/www.coffeeandsecurity.com\/resources\/papers\/defeat-vk.pdf"},{"key":"71_CR4","unstructured":"Cracking On-Screen Keyboards with Visual Keyloggers, \n                    \n                      http:\/\/mrooney.blogspot.com\/2009\/02\/cracking-on-screen-keyboards-with.html"},{"key":"71_CR5","unstructured":"Virtual Keyboard and the Fight Against Keyloggers, \n                    \n                      http:\/\/palisade.plynt.com\/issues\/2009Feb\/fight-against-keyloggers\/"},{"key":"71_CR6","unstructured":"W32\/Dumaru, \n                    \n                      http:\/\/www.mcafee.com\/threat-intelligence\/malware\/default.aspx?id=100980"},{"key":"71_CR7","unstructured":"Screenshot, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Screenshot"},{"key":"71_CR8","unstructured":"Trusteer Rapport, \n                    \n                      http:\/\/www.trusteer.com\/product\/trusteer-rapport"},{"key":"71_CR9","unstructured":"SnoopFree Privacy Shield, \n                    \n                      http:\/\/www.snoopfree.com\/"},{"key":"71_CR10","unstructured":"HTML5 Canvas, \n                    \n                      http:\/\/diveintohtml5.org\/canvas.html"},{"key":"71_CR11","unstructured":"Canvas Tutorial, \n                    \n                      https:\/\/developer.mozilla.org\/en\/canvas_tutorial"},{"key":"71_CR12","unstructured":"Basic Usage of Canvas Element, \n                    \n                      https:\/\/developer.mozilla.org\/en\/Canvas_tutorial\/Basic_usage"},{"key":"71_CR13","unstructured":"Drawing Graphics with Canvas, \n                    \n                      https:\/\/developer.mozilla.org\/en\/drawing_graphics_with_canvas"},{"key":"71_CR14","unstructured":"HTMLCanvasElement, \n                    \n                      https:\/\/developer.mozilla.org\/en\/DOM\/HTMLCanvasElement"},{"key":"71_CR15","unstructured":"OnHacks Firefox Malware Tutorial, \n                    \n                      http:\/\/onhacks.org\/lang\/en\/2009\/02\/11\/firefox-malware-tutorial-1\/"},{"key":"71_CR16","unstructured":"nsIDOMHTMLCanvasElement interface, \n                    \n                      http:\/\/www.oxymoronical.com\/experiments\/xpcomref\/applications\/Firefox\/3.5\/interfaces\/nsIDOMHTMLCanvasElement"},{"key":"71_CR17","unstructured":"nsIDOMCanvasRenderingContext2D, \n                    \n                      https:\/\/developer.mozilla.org\/en\/XPCOM_Interface_Reference\/nsIDOMCanvasRenderingContext2D"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T13:13:59Z","timestamp":1553951639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_71","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}