{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:07:03Z","timestamp":1763968023101},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/sp.2010.36","type":"proceedings-article","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T14:45:51Z","timestamp":1279637151000},"page":"481-496","source":"Crossref","is-referenced-by-count":128,"title":["ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser"],"prefix":"10.1109","author":[{"given":"Leo A.","family":"Meyerovich","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Livshits","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Robust composition: Towards a unified approach to access control and concurrency control","year":"2006","author":"miller","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1297081.1297089"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294264"},{"journal-title":"Fiddler Web Debugging Proxy","year":"2007","author":"lawrence","key":"ref32"},{"key":"ref31","article-title":"Parallelizing the web browser","author":"jones","year":"2009","journal-title":"Proc of Workshop on Hot Topics in Parallelism"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772764"},{"key":"ref37","article-title":"Preventing capability leaks in secure Javascript subsets","author":"finifter","year":"2010","journal-title":"Proc Symp Network and Distributed System Security"},{"journal-title":"FBJS Facebook developers wiki","article-title":"Facebook","year":"2007","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/357766.351245"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453151"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/383845.383853"},{"journal-title":"AOP fun with JavaScript","year":"2001","author":"porotnikov","key":"ref40"},{"key":"ref11","article-title":"Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code","author":"guarnieri","year":"2009","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542483"},{"article-title":"Using JavaScript code modules","year":"2009","author":"foundation","key":"ref13"},{"article-title":"ADSafe","year":"0","author":"crockford","key":"ref14"},{"key":"ref15","article-title":"An overview of AspectJ","author":"kiczales","year":"2001","journal-title":"Proceedings of the European Conference on Object-Oriented Programming"},{"year":"2009","key":"ref16","article-title":"ECMA-262: ECMAScript language specification, version 3.1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297051"},{"key":"ref19","first-page":"2009","article-title":"ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser","author":"livshits","year":"2009","journal-title":"Microsoft Research Tech Rep"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932213"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242654"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533067"},{"key":"ref6","article-title":"End-to-end Web application security","author":"erlingsson","year":"2007","journal-title":"Proceedings of the Workshop on Hot Topics in Operating Systems"},{"journal-title":"Worm Js yamanneram","year":"2006","key":"ref29"},{"key":"ref5","article-title":"Mashu-pOS: Operating system abstractions for client mashups","author":"howell","year":"2007","journal-title":"Proceedings of the Workshop on Hot Topics in Operating Systems"},{"article-title":"Web Sandbox - Microsoft Live Labs","year":"2009","author":"isaacs","key":"ref8"},{"key":"ref7","first-page":"10","article-title":"Caja - safe active content in sanitized JavaScript","author":"miller","year":"2007"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-89330-1_23","article-title":"JavaScript instrumentation in practice","author":"kikuchi","year":"2008","journal-title":"Proc Asian Symp Program Languages Syst"},{"key":"ref9","article-title":"BrowserShield: Vulnerability-driven filtering of dynamic HTML","author":"reis","year":"2006","journal-title":"Proceedings of Operating System Design and Implementation"},{"article-title":"JavaScript hijacking","year":"2007","author":"chess","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526785"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526838"},{"key":"ref21","article-title":"Securing frame communication in browsers","author":"barth","year":"2008","journal-title":"Proceedings of the Conference on Security Symposium"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111071"},{"journal-title":"Microsoft Live LabsVolta","year":"2007","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1509276.1509285"},{"journal-title":"Google Web Toolkit","year":"0","key":"ref23"},{"journal-title":"Proceedings of the workshop on New security paradigms","article-title":"Sasi enforcement of security policies: a retrospective","year":"2000","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766716"},{"journal-title":"Script#","year":"2008","author":"kothari","key":"ref25"}],"event":{"name":"2010 IEEE Symposium on Security and Privacy","start":{"date-parts":[[2010,5,16]]},"location":"Oakland, CA, USA","end":{"date-parts":[[2010,5,19]]}},"container-title":["2010 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5504620\/5504699\/05504806.pdf?arnumber=5504806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T07:07:53Z","timestamp":1497856073000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5504806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/sp.2010.36","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}