{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:32:04Z","timestamp":1725881524871},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031557"},{"type":"electronic","value":"9789811031564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3156-4_17","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T07:13:45Z","timestamp":1488438825000},"page":"169-178","source":"Crossref","is-referenced-by-count":6,"title":["STRIDE Based Analysis of the Chrome Browser Extensions API"],"prefix":"10.1007","author":[{"given":"P. K.","family":"Akshay Dev","sequence":"first","affiliation":[]},{"given":"K. P.","family":"Jevitha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"17_CR1","unstructured":"L. Liu, X. Zhang, G. Yan, S. Chen, Chrome extensions: threat analysis and countermeasures, in NDSS (2012)"},{"key":"17_CR2","unstructured":"Microsoft STRIDE threat model, https:\/\/msdn.microsoft.com\/en-us\/library\/ee823878%28v=cs.20%29.aspx"},{"key":"17_CR3","unstructured":"S.F. Burns, Threat modeling: a process to ensure application security, in GIAC Security Essentials Certification (GSEC) Practical Assignment (2005)"},{"key":"17_CR4","unstructured":"N. Carlini, A. Porter Felt, D. Wagner, An evaluation of the google chrome extension security architecture, in Presented as Part of the 21st USENIX Security Symposium (USENIX Security 12), pp. 97\u2013111 (2012)"},{"key":"17_CR5","first-page":"267","volume":"2","author":"V Aravind","year":"2014","unstructured":"V. Aravind, M. Sethumadhavan, A framework for analysing the security of chrome extensions. Adv. Comput. Netw. Inf. 2, 267\u2013272 (2014)","journal-title":"Adv. Comput. Netw. Inf."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"J. Arunagiri, S. Rakhi, K.P. Jevitha, A systematic review of security measures for web browser extension vulnerabilities, in Proceedings of the International Conference on Soft Computing Systems (Springer India, 2016)","DOI":"10.1007\/978-81-322-2674-1_10"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"R. Zhao, C. Yue, Q. Yi, Automatic detection of information leakage vulnerabilities in browser extensions, in Proceedings of the 24th International Conference on World Wide Web (International World Wide Web Conferences Steering Committee, 2015)","DOI":"10.1145\/2736277.2741134"},{"key":"17_CR8","unstructured":"A. Kapravelos, et al., Hulk: eliciting malicious behavior in browser extensions, in 23rd USENIX Security Symposium (USENIX Security 14) (2014)"},{"key":"17_CR9","unstructured":"N. Jagpal, et al., Trends and lessons from three years fighting malicious extensions, in 24th USENIX Security Symposium (USENIX Security 15) (2015)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"K. Onarlioglu, et al., Sentinel: securing legacy firefox extensions. Comput. Secur. 49, 147\u2013161 (2015)","DOI":"10.1016\/j.cose.2014.12.002"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"X. Xing, et al., Understanding malvertising through ad-injecting browser extensions, in Proceedings of the 24th International Conference on World Wide Web (International World Wide Web Conferences Steering Committee, 2015)","DOI":"10.1145\/2736277.2741630"},{"key":"17_CR12","unstructured":"Chrome extension developer guide, https:\/\/developer.chrome.com\/extensions\/overview"},{"key":"17_CR13","unstructured":"Chromium blog, http:\/\/blog.chromium.org\/"},{"key":"17_CR14","unstructured":"Chrome extension specific API index, https:\/\/developer.chrome.com\/extensions\/api_index"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3156-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T07:00:39Z","timestamp":1568876439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3156-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031557","9789811031564"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3156-4_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}