{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T04:51:42Z","timestamp":1743915102203},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isspit.2014.7300602","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T22:19:44Z","timestamp":1445897984000},"page":"000290-000295","source":"Crossref","is-referenced-by-count":2,"title":["Bypassing XSS Auditor: Taking advantage of badly written PHP code"],"prefix":"10.1109","author":[{"given":"Anastasios","family":"Stasinopoulos","sequence":"first","affiliation":[]},{"given":"Christoforos","family":"Ntantogian","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Xenakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772701"},{"journal-title":"sla ckers org Chrome gets XSS filters","year":"0","key":"ref11"},{"journal-title":"Bypassing Chrome's Anti-XSS filter","year":"0","author":"nikiforakis","key":"ref12"},{"journal-title":"Security Google Chrome Anti-XSS filter circumvention","year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"article-title":"A tale of the weaknesses of current client-side XSS filtering","year":"2014","author":"lekies","key":"ref16"},{"article-title":"Bypassing NoScript's XSS filters via Error Basd SQLi","year":"0","author":"makan","key":"ref17"},{"key":"ref18","article-title":"Of Trusted And Untrusted Data","author":"waysea's","year":"0","journal-title":"Blog"},{"year":"2013","author":"mario","key":"ref19"},{"year":"2013","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"journal-title":"Cross-Site Scripting","year":"0","key":"ref5"},{"year":"0","key":"ref8","article-title":"IE 8 XSS Filter Architecture\/Implementation"},{"year":"0","key":"ref7","article-title":"The WebKit Open Source Project"},{"year":"0","key":"ref2"},{"year":"0","key":"ref9"},{"year":"0","key":"ref1"},{"year":"0","key":"ref20","article-title":"How Browsers Work: Behind the scenes of modern web browsers"},{"year":"0","key":"ref22","article-title":"XSS (Cross Site Scripting) Prevention Cheat Sheet"},{"year":"0","key":"ref21","article-title":"The Nan Property"},{"article-title":"Google's XSS Vulnerability","year":"0","author":"shiflett","key":"ref24"},{"year":"0","key":"ref23","article-title":"htmlspecialcharst) _ Convert special characters to HTML entities"},{"year":"0","key":"ref25"}],"event":{"name":"2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)","start":{"date-parts":[[2014,12,15]]},"location":"Noida, India","end":{"date-parts":[[2014,12,17]]}},"container-title":["2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7277353\/7300553\/07300602.pdf?arnumber=7300602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:28:48Z","timestamp":1490416128000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7300602\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isspit.2014.7300602","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}