{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:30:43Z","timestamp":1774449043596,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,1,12]],"date-time":"2008-01-12T00:00:00Z","timestamp":1200096000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1007\/s11416-007-0078-5","type":"journal-article","created":{"date-parts":[[2008,1,11]],"date-time":"2008-01-11T08:48:00Z","timestamp":1200041280000},"page":"179-195","source":"Crossref","is-referenced-by-count":53,"title":["Enhancing web browser security against malware extensions"],"prefix":"10.1007","volume":"4","author":[{"given":"Mike","family":"Ter Louw","sequence":"first","affiliation":[]},{"given":"Jin Soon","family":"Lim","sequence":"additional","affiliation":[]},{"given":"V. N.","family":"Venkatakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,1,12]]},"reference":[{"key":"78_CR1","unstructured":"eTrust~PestPatrol. Pests detected by PestPatrol and classified as browser helper object. http:\/\/www.pestpatrol.com\/pestinfo%5Cbrowser_helper_object.asp , March 2005"},{"key":"78_CR2","unstructured":"Firefox extension security project website. http:\/\/alcazar.sisl.rites.uic.edu\/wiki\/view\/Main\/ExtensibleWebBrowserSecurity"},{"key":"78_CR3","unstructured":"Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A secure environment for untrusted helper applications: Confining the wily hacker. In: Sixth USENIX Security Symposium, San Jose, CA, USA (1996)"},{"key":"78_CR4","doi-asserted-by":"crossref","unstructured":"Hallaraker, O., Vigna, G.: Detecting malicious JavaScript code in Mozilla. In: 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), Shanghai, China (2005)","DOI":"10.1109\/ICECCS.2005.35"},{"key":"78_CR5","unstructured":"Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.A.: Behavior-based spyware detection. In: 15th USENIX Security Symposium, Vancouver, BC, Canada (2006)"},{"key":"78_CR6","unstructured":"Kirk, J.: Trojan cloaks itself as Firefox extension. Infoworld magazine, July 2006"},{"issue":"10","key":"78_CR7","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson B.W. (1973). A note on the confinement problem. Commun. ACM 16(10): 613\u2013615","journal-title":"Commun. ACM"},{"key":"78_CR8","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, X., Choi, J.Y.: SpyShield: Preserving privacy from spy add-ons. In: 10th International Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast, QLD, Australia (2007)","DOI":"10.1007\/978-3-540-74320-0_16"},{"key":"78_CR9","unstructured":"Information from http:\/\/addons.mozilla.org"},{"key":"78_CR10","unstructured":"Mozilla Firefox at Wikipedia http:\/\/en.wikipedia.org\/wiki\/Mozilla_Firefox"},{"key":"78_CR11","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-carrying code. In: 24th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), Paris, France (1997)","DOI":"10.1145\/263699.263712"},{"key":"78_CR12","doi-asserted-by":"crossref","unstructured":"Reis, C., Dunagan, J., Wang, H.J., Dubrovsky, O., Esmeir, S.: BrowserShield: Vulnerability-driven filtering of dynamic HTML. In: 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Seattle, WA, USA (2006)","DOI":"10.1145\/1281480.1281481"},{"key":"78_CR13","doi-asserted-by":"crossref","unstructured":"Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model carrying code: a practical approach for safe execution of untrusted applications. In: 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, USA (2003)","DOI":"10.1145\/945445.945448"},{"key":"78_CR14","unstructured":"Soghoian, C.: A remote vulnerability in Firefox extensions. http:\/\/paranoia.dubfire.net\/2007\/05\/remote-vulnerability-in-firefox.html (2007 )"},{"key":"78_CR15","doi-asserted-by":"crossref","unstructured":"Ter Louw, M., Lim, J.S., Venkatakrishnan, V.N.: Extensible web browser security. In: 4th GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assesment (DIMVA), Lucerne, Switzerland (2007)","DOI":"10.1007\/978-3-540-73614-1_1"},{"key":"78_CR16","unstructured":"Tsyrklevich, E., Yee, B.: Dynamic detection and prevention of race conditions in file accesses. In: 12th USENIX Security Symposium, Washington, D.C., USA (2003)"},{"issue":"12","key":"78_CR17","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/38807.38828","volume":"22","author":"D. Ungar","year":"1987","unstructured":"Ungar D. and Smith R.B. (1987). Self: The power of simplicity. ACM SIGPLAN Notices 22(12): 227\u2013242","journal-title":"ACM SIGPLAN Notices"},{"key":"78_CR18","unstructured":"Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: 14th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA (2007)"},{"key":"78_CR19","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T., Graham, S.: Efficient software-based fault isolation. In: 14th ACM Symposium on Operating System Principles (SOSP), Asheville, NC, USA (1993)","DOI":"10.1145\/168619.168635"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0078-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-007-0078-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0078-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:45:42Z","timestamp":1559385942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-007-0078-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,12]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["78"],"URL":"https:\/\/doi.org\/10.1007\/s11416-007-0078-5","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,12]]}}}