{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:52:53Z","timestamp":1742388773557},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,25]]},"DOI":"10.1109\/iccta35431.2014.9521633","type":"proceedings-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T20:37:02Z","timestamp":1630096622000},"page":"68-75","source":"Crossref","is-referenced-by-count":1,"title":["Prevention Of DOM Based XSS Attacks Using A White List Framework"],"prefix":"10.1109","author":[{"given":"Khaled","family":"Ali","sequence":"first","affiliation":[]},{"given":"Ayman","family":"Abdel-Hamid","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Kholief","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"OWASP Open Web Application Security Project DOM Based XSS","year":"2014","key":"ref10"},{"journal-title":"DOMinator Tool for analysis of DOM based XSS issues","year":"2014","key":"ref11"},{"journal-title":"ConDOM Containing the DOM for Safe Browsing","year":"2012","author":"kerschbaumer","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_15"},{"journal-title":"Acunetix Web Vulnerability Scanner","year":"2014","key":"ref14"},{"journal-title":"DOM XSS Wiki","year":"2014","key":"ref15"},{"journal-title":"Unraveling some of the Mysteries around DOM-based XSS","year":"2014","author":"wichers","key":"ref16"},{"journal-title":"NoScript Firefex Extension","year":"2014","key":"ref17"},{"journal-title":"NotScript the security extension tool in Google Chrome web store","year":"2014","key":"ref18"},{"journal-title":"DOM XSS scanner online detection tool","year":"2014","key":"ref19"},{"journal-title":"Towards Elimination of XSS Attacks with a Trusted and Capability Controlled DOM","year":"2012","author":"heiderich","key":"ref4"},{"journal-title":"(Minded Security) Analysis and Identification of DOM Based XSS Issues","year":"2014","author":"paola","key":"ref3"},{"journal-title":"OWASP Foundation - Types of Cross Site Scripting","year":"2014","key":"ref6"},{"journal-title":"What is the Document Object Model in W3C DOM Level 2 Core Specifications","year":"2000","author":"hegaret","key":"ref5"},{"key":"ref8","article-title":"Hybrid Analysis for JavaScript Security Assessment","author":"tripp","year":"2010","journal-title":"Proceedings of the 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering"},{"journal-title":"GovCertUK CESG National Technical Authority for Information Assurance Cross Site Scripting Techniques and mitigation","year":"2007","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283902"},{"journal-title":"OWASP Open Web Application Security Project OWASP top 10 The ten most critical web application security risks","year":"2014","key":"ref1"},{"journal-title":"Ra 2 Black Box DOM detection tool (Presentation) - International Security Conference","year":"2014","key":"ref9"},{"journal-title":"DOMSnitch A passive reconnaissance tool inside the DOM (experimental)","year":"2014","key":"ref20"},{"journal-title":"Ra 2 - Blackbox DOM XSS Scanner","year":"2014","key":"ref21"}],"event":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2014,10,25]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2014,10,27]]}},"container-title":["2014 24th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521546\/9521602\/09521633.pdf?arnumber=9521633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T21:18:31Z","timestamp":1637615911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9521633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,25]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccta35431.2014.9521633","relation":{},"subject":[],"published":{"date-parts":[[2014,10,25]]}}}