{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:20Z","timestamp":1763468120781},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_15","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"227-243","source":"Crossref","is-referenced-by-count":25,"title":["Touchjacking Attacks on Web in Android, iOS, and Windows Phone"],"prefix":"10.1007","author":[{"given":"Tongbo","family":"Luo","sequence":"first","affiliation":[]},{"given":"Xing","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ajai","family":"Ananthanarayanan","sequence":"additional","affiliation":[]},{"given":"Wenliang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Android-Team. Webview class reference, \n                    \n                      http:\/\/developer.android.com\/reference\/android\/webkit\/WebView.html"},{"key":"15_CR2","unstructured":"Close, T.: The confused deputy rides again! (2008), \n                    \n                      http:\/\/waterken.sourceforge.net\/clickjacking\/"},{"key":"15_CR3","unstructured":"Felt, A., Wagner, D.: Phishing on mobile devices. In: Web 2.0 Security and Privacy (2011)"},{"key":"15_CR4","unstructured":"Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. In: Proceedings of the 2nd USENIX Conference on Web Application Development, WebApps 2011, Berkeley, CA, USA, p. 7 (2011)"},{"key":"15_CR5","unstructured":"Firefox. The x-frame-options response header, \n                    \n                      https:\/\/developer.mozilla.org\/en\/The_X-FRAME-OPTIONS_response_header"},{"key":"15_CR6","unstructured":"Hansen, R.: Clickjacking, \n                    \n                      http:\/\/ha.ckers.org\/blog\/20080915\/clickjacking\/"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Luo, T., Hao, H., Du, W., Wang, Y., Yin, H.: Attacks on webview in the android system. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 343\u2013352. ACM (2011)","DOI":"10.1145\/2076732.2076781"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Luo, T., Jin, X., Du, W.: Mediums: Visual integrity preserving framework. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013 (2013)","DOI":"10.1145\/2435349.2435394"},{"key":"15_CR9","unstructured":"Niemietz, M.: Ui redressing: Attacks and countermeasures revisited. In: CONFidence 2011 (2011)"},{"key":"15_CR10","first-page":"101","volume-title":"Proceedings of the 1st Conference on Usability, Psychology, and Security","author":"Y. Niu","year":"2008","unstructured":"Niu, Y., Hsu, F., Chen, H.: iphish: phishing vulnerabilities on consumer electronics. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, pp. 10:1\u201310:8. USENIX Association, Berkeley (2008)"},{"key":"15_CR11","unstructured":"Ruderman, J.: Bug 154957 - iframe content background defaults to transparent (2002), \n                    \n                      https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=154957"},{"key":"15_CR12","unstructured":"Rydstedt, G., Bursztein, E., Boneh, D., Jackson, C.: Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In: IEEE Oakland Web 2.0 Security and Privacy (2010)"},{"key":"15_CR13","unstructured":"Rydstedt, G., Gourdin, B., Bursztein, E., Boneh, D.: Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks. In: Proceedings of the 4th USENIX Conference on Offensive Technologies, pp. 1\u20138. USENIX Association (2010)"},{"key":"15_CR14","unstructured":"Sophos. Facebook worm - likejacking (2010), \n                    \n                      http:\/\/nakedsecurity.sophos.com\/2010\/05\/31\/facebook-likejacking-worm\/"},{"key":"15_CR15","unstructured":"Stone, P.: Next generation clickjacking (2010)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Zalewski, M.: Browser security handbook (2008), \n                    \n                      http:\/\/code.google.com\/p\/browsersec\/wiki\/Part2","DOI":"10.1016\/S1353-4858(08)70103-X"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T00:26:52Z","timestamp":1557620812000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}