{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T04:03:18Z","timestamp":1743307398828,"version":"3.40.3"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2039606","2219920"],"award-info":[{"award-number":["2039606","2219920"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Union","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/msec.2024.3443625","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:49:11Z","timestamp":1727372951000},"page":"52-60","source":"Crossref","is-referenced-by-count":1,"title":["With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2650-2055","authenticated-orcid":false,"given":"Harun","family":"Oz","sequence":"first","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4358-976X","authenticated-orcid":false,"given":"Daniele Cono","family":"D\u2019Elia","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5472-141X","authenticated-orcid":false,"given":"G\u00fcliz Seray","family":"Tuncay","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4891-160X","authenticated-orcid":false,"given":"Abbas","family":"Acar","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3835-9679","authenticated-orcid":false,"given":"Riccardo","family":"Lazzeretti","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-3464","authenticated-orcid":false,"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Florida International University, Miami, FL, USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2987443.2987466"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3133956.3133966"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-29883-2_18"},{"key":"ref4","first-page":"7073","article-title":"RB: Ransomware over modern web browsers","volume-title":"Proc. USENIX Security Symp.","author":"Oz","year":"2023"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/SP.2014.10"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.14722\/ndss.2019.23070"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICITST.2015.7412126"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.14722\/ndss.2019.23009"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3543507.3583333"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2664243.2664247"},{"key":"ref11","article-title":"Rope: Bypassing behavioral detection of malware with distributed ROP-driven execution","volume-title":"Black Hat USA 2021","author":"DElia","year":"2021"},{"key":"ref12","first-page":"6003","article-title":"Trust me if you canHow usable is trusted types in practice?","volume-title":"Proc. USENIX Security Symp.","author":"Roth","year":"2024"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3460120.3484578"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3355369.3355599"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.14722\/ndss.2024.24108"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8013\/10942488\/10695030.pdf?arnumber=10695030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:39:18Z","timestamp":1743223158000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10695030\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":15,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/msec.2024.3443625","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}