{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:38:26Z","timestamp":1649104706989},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T00:00:00Z","timestamp":1476316800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11623-016-0688-5","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T10:32:07Z","timestamp":1476268327000},"page":"707-712","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Client-Side XSS in Theorie und Praxis"],"prefix":"10.1007","volume":"40","author":[{"given":"Ben","family":"Stock","sequence":"first","affiliation":[]},{"given":"Martin","family":"Johns","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"key":"688_CR1","volume-title":"DOM Based Cross Site Scripting or XSS of the Third Kind","author":"A Klein","year":"2005","unstructured":"Amit Klein: DOM Based Cross Site Scripting or XSS of the Third Kind. Web Application Security Consortium, Articles 4, 2005. \u3008\n                    http:\/\/www.webappsec.org\/projects\/articles\/071105.shtml\n                    \n                  \u3009"},{"issue":"5","key":"688_CR2","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1524\/itit.2011.0651","volume":"53","author":"M Johns","year":"2011","unstructured":"Martin Johns: Code-injection Vulnerabilities in Web Applications \u2014 Exemplified at Cross-site Scripting. It \u2014 Information Technology 53(5): 256\u2013259, May 2011","journal-title":"It \u2014 Information Technology"},{"key":"688_CR3","first-page":"52","volume-title":"Proceedings of the 25th European conference on Object-oriented programming (ECOOP\u201911)","author":"G Richards","year":"2011","unstructured":"Gregor Richards, Christian Hammer, Brian Burg, und Jan Vitek. 2011: The eval that men do: A large-scale study of the use of eval in javascript applications. In Proceedings of the 25th European conference on Object-oriented programming (ECOOP\u201911), Mira Mezini (Ed.). Springer-Verlag, Berlin, Heidelberg, 52\u201378."},{"key":"688_CR4","volume-title":"Network and Distributed System Security Symposium (NDSS\u201913)","author":"S S","year":"2013","unstructured":"Son, S, Shmatikov, V.: The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites. Network and Distributed System Security Symposium (NDSS\u201913), 2013"},{"key":"688_CR5","volume-title":"22nd ACM Conference on Computer and Communications Security (ACM CCS\u201915)","author":"B Stock","year":"2015","unstructured":"Ben Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies und Martin Johns: From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting. 22nd ACM Conference on Computer and Communications Security (ACM CCS\u201915), Oct. 2015"},{"key":"688_CR6","volume-title":"23rd USENIX Security Symposium (USENIX Security\u2019 14)","author":"B Stock","year":"2014","unstructured":"Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel und Martin Johns: Precise Client-side Protection against DOM-based Cross-Site Scripting. In 23rd USENIX Security Symposium (USENIX Security\u2019 14), August 2014"},{"key":"688_CR7","volume-title":"20th ACM Conference on Computer and Communications Security (ACM CCS\u201913)","author":"S Lekies","year":"2013","unstructured":"Sebastian Lekies, Ben Stock, Martin Johns: 25 Million Flows Later \u2014 Largescale Detection of DOM-based XSS. In 20th ACM Conference on Computer and Communications Security (ACM CCS\u201913), November 2013"},{"key":"688_CR8","volume-title":"Untangling the Web of Client-Side Cross-Site Scripting","author":"B Stock","year":"2015","unstructured":"Ben Stock: Untangling the Web of Client-Side Cross-Site Scripting. Dissertation. Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), 2015"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-016-0688-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0688-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0688-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T05:23:16Z","timestamp":1529990596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-016-0688-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"references-count":8,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["688"],"URL":"https:\/\/doi.org\/10.1007\/s11623-016-0688-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,13]]}}}