{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:24:39Z","timestamp":1755926679681,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004040","name":"KU Leuven","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004040","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833872","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"20-30","source":"Crossref","is-referenced-by-count":2,"title":["Towards Improving the Deprecation Process of Web Features through Progressive Web Security"],"prefix":"10.1109","author":[{"given":"Tom","family":"Van Goethem","sequence":"first","affiliation":[{"name":"Imec-DistriNet, KU Leuven"}]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"Imec-DistriNet, KU Leuven"}]}],"member":"263","reference":[{"article-title":"Security: UaF in Appcache","year":"2018","author":"williamson","key":"ref10"},{"article-title":"Origin isolation and deprecating document.domain","year":"2021","author":"vogelheim","key":"ref11"},{"year":"2020","key":"ref12","article-title":"Origin-keyed agent clusters explainer"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref14","article-title":"Busting frame busting: a study of clickjacking vulnerabilities at popular sites","volume":"2","author":"rydstedt","year":"2010","journal-title":"IEEE Oakland Web"},{"article-title":"X-Frame-Options: All about clickjacking?","year":"2013","author":"braun","key":"ref15"},{"article-title":"Embedding should require explicit opt-in","year":"2020","author":"west","key":"ref16"},{"year":"2020","key":"ref17","article-title":"Frame Counting"},{"year":"2020","key":"ref18","article-title":"Cross-Origin-Opener-Policy"},{"article-title":"COOP by default","year":"2020","author":"west","key":"ref19"},{"key":"ref28","first-page":"1733","article-title":"RAZOR: A framework for post-deployment software debloating","author":"qian","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"year":"2022","key":"ref4","article-title":"Site permission add-ons"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133966"},{"year":"2022","key":"ref3","article-title":"Origin trials"},{"article-title":"AppCache&#x2019;s forgotten tales","year":"2021","author":"herrera","key":"ref6"},{"key":"ref29","first-page":"1697","article-title":"Less is more: quantifying the security benefits of debloating web applications","author":"azad","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23027"},{"article-title":"AppCache may be used to bypass CORB","year":"2019","author":"anforowicz","key":"ref8"},{"article-title":"In presence of NetworkService, AppCache may be used to bypass CORB","year":"2018","author":"anforowicz","key":"ref7"},{"year":"2022","key":"ref2","article-title":"MDN browser compat data"},{"key":"ref9","first-page":"447","article-title":"Request and conquer: Exposing cross-origin resource size","author":"van goethem","year":"2016","journal-title":"25th USENIX Security Symposium (USENIX Security 16)"},{"article-title":"Can I use","year":"2022","author":"deveria","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00044"},{"article-title":"Intent to ship: Origin isolation by default \/ deprecate document.domain","year":"2021","author":"vogelheim","key":"ref22"},{"article-title":"Intent to deprecate: WebAssembly cross-origin module sharing","year":"2021","author":"vahl","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950298"},{"article-title":"Deprecate cross-origin module sharing","year":"2021","author":"lamy","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09713-w"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.64"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2022,5,22]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833872.pdf?arnumber=9833872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:36Z","timestamp":1660593756000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833872\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833872","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}