{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:15:23Z","timestamp":1725462923149},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890948","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:43:34Z","timestamp":1410363814000},"page":"264-273","source":"Crossref","is-referenced-by-count":2,"title":["Detection and mitigation of malicious JavaScript using information flow control"],"prefix":"10.1109","author":[{"given":"Bassam","family":"Sayed","sequence":"first","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]},{"given":"Amany","family":"Abdelhalim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Spyproxy: Execution-based detection of malicious web content","author":"moshchuk","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141357"},{"key":"18","article-title":"A crawler-based study of spyware on the web","author":"moshchuk","year":"2006","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"15","first-page":"3","article-title":"Zozzle: Fast and precise in-browser javascript malware detection","author":"curtsinger","year":"2011","journal-title":"Proceedings of the 20th USENIX Conference on Security Ser SEC'11"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283902"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403020"},{"key":"11","article-title":"Preventing capability leaks in secure javascript subsets","author":"finifter","year":"2010","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.39"},{"key":"21","first-page":"1","article-title":"All your iframes point to us","author":"mavrommatis","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"20","first-page":"35","article-title":"Automated web patrol with strider honeymonkeys","author":"wang","year":"2006","journal-title":"Proc Symp Network and Distributed System Security"},{"journal-title":"Malzilla Malware Hunting Tool","year":"2013","author":"spasic","key":"22"},{"journal-title":"Reverse Engineering Malicious Javascript","year":"2007","author":"nazario","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720649"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190252"},{"key":"27","first-page":"429","article-title":"Towards type inference for javascript","author":"anderson","year":"2005","journal-title":"PROC 19TH EUROPEAN CONFERENCE on OBJECT-ORIENTED PROGRAMMING"},{"key":"28","first-page":"408","article-title":"Towards a type system for analyzing javascript programs","author":"thiemann","year":"2005","journal-title":"Proceedings of the 14th European Conference on Programming Languages and Systems Ser ESOP'05"},{"journal-title":"Ecmascript Language Specification Standard Ecma-262","year":"2013","key":"29"},{"key":"3","article-title":"Cross-site scripting prevention with dynamic data tainting and static analysis","author":"vogt","year":"2007","journal-title":"Proc of Network and Distributed System Security Symposium (NDSS)"},{"journal-title":"Mikeyy Computer Worm","year":"2013","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.36"},{"journal-title":"Samy Computer Worm","year":"2013","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382238"},{"year":"2013","key":"7"},{"year":"2013","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1281480.1281481"},{"key":"4","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-540-89330-1_22","article-title":"An operational semantics for javascript","author":"maffeis","year":"2008","journal-title":"Proceedings of the 6th Asian Symposium on Programming Languages and Systems Ser APLAS '08"},{"key":"9","first-page":"1","article-title":"The essence of JavaScript","author":"guha","year":"2010","journal-title":"ECOOP 2010-Object-Oriented"},{"key":"8","article-title":"ADsafety: Type-based verification of javascript sandboxing","author":"politz","year":"2011","journal-title":"SEC'11 Proceedings of the 20th USENIX Conference on Security"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890948.pdf?arnumber=6890948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:12:50Z","timestamp":1498162370000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890948","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}