{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:31:08Z","timestamp":1774837868668,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1145\/1519065.1519091","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"233-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Privacy-preserving browser-side scripting with BFlow"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Yip","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Neha","family":"Narula","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maxwell","family":"Krohn","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Morris","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adobe. Flash. http:\/\/www.adobe.com\/products\/flash Jan 2009.  Adobe. Flash. http:\/\/www.adobe.com\/products\/flash Jan 2009."},{"key":"e_1_3_2_1_2_1","first-page":"17","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Barth Adam","year":"2008"},{"key":"e_1_3_2_1_3_1","unstructured":"Beautifulbeta. Blogger widgets. http:\/\/beautifulbeta.blogspot.com Jan 2009.  Beautifulbeta. Blogger widgets. http:\/\/beautifulbeta.blogspot.com Jan 2009."},{"key":"e_1_3_2_1_5_1","unstructured":"Blogger. Site. http:\/\/www.blogger.com Jan 2009.  Blogger. Site. http:\/\/www.blogger.com Jan 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Chong Stephen","year":"2007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_9_1","unstructured":"Trusted Computer System Evaluation Criteria (Orange Book). Department of Defense dod 5200.28-std edition Dec 1985.  Trusted Computer System Evaluation Criteria (Orange Book). Department of Defense dod 5200.28-std edition Dec 1985."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352624"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_12_1","unstructured":"Facebook. Site. http:\/\/www.facebook.com Jan 2009.  Facebook. Site. http:\/\/www.facebook.com Jan 2009."},{"key":"e_1_3_2_1_13_1","unstructured":"Firefox. Add-ons. https:\/\/addons.mozilla.org\/ Jan 2009.  Firefox. Add-ons. https:\/\/addons.mozilla.org\/ Jan 2009."},{"key":"e_1_3_2_1_14_1","unstructured":"Flickr. Badge. http:\/\/www.flickr.com\/badge.gne Jan 2009.  Flickr. Badge. http:\/\/www.flickr.com\/badge.gne Jan 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367599"},{"key":"e_1_3_2_1_16_1","unstructured":"Google. Gadgets. http:\/\/www.google.com\/webmasters\/gadgets\/ Jan 2009.  Google. Gadgets. http:\/\/www.google.com\/webmasters\/gadgets\/ Jan 2009."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. Google chrome: a new web browser for windows. http:\/\/www.google.com\/chrome Jan 2009.  Google. Google chrome: a new web browser for windows. http:\/\/www.google.com\/chrome Jan 2009."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. Maps API. http:\/\/code.google.com\/apis\/maps Jan 2009.  Google. Maps API. http:\/\/code.google.com\/apis\/maps Jan 2009."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. Open Social. http:\/\/code.google.com\/apis\/opensocial Jan 2009.  Google. Open Social. http:\/\/code.google.com\/apis\/opensocial Jan 2009."},{"key":"e_1_3_2_1_20_1","unstructured":"James Gosling Bill Joy Guy Steele and Gilad Bracha. The Java Language Specification. Addison-Wesley Professional third edition 2005.   James Gosling Bill Joy Guy Steele and Gilad Bracha. The Java Language Specification. Addison-Wesley Professional third edition 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2005.35"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242654"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 6th ACM Workshop on Hot Topics in Networks","author":"Krohn Maxwell","year":"2007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"e_1_3_2_1_26_1","first-page":"335","volume-title":"Proceedings of the 2008 USENIX Annual Technical Conference","author":"Livshits Benjamin","year":"2008"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.55088"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380220805"},{"key":"e_1_3_2_1_29_1","unstructured":"Mark S. Miller Mike Samuel Ben Laurie Ihab Awad and Mike Stay. Caja: Safe active content in sanitized javascript 2008. http:\/\/code.google.com\/p\/google-caja\/downloads\/list.  Mark S. Miller Mike Samuel Ben Laurie Ihab Awad and Mike Stay. Caja: Safe active content in sanitized javascript 2008. http:\/\/code.google.com\/p\/google-caja\/downloads\/list."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_31_1","first-page":"61","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation","author":"Reis C.","year":"2006"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 6th ACM Workshop on Hot Topics in Networks","author":"Reis Charles","year":"2007"},{"key":"e_1_3_2_1_33_1","unstructured":"script.aculo.us. Library. http:\/\/script.aculo.us Jan 2009.  script.aculo.us. Library. http:\/\/script.aculo.us Jan 2009."},{"key":"e_1_3_2_1_34_1","unstructured":"Twitter. Badge. http:\/\/twitter.com\/badges\/blogger Jan 2009.  Twitter. Badge. http:\/\/twitter.com\/badges\/blogger Jan 2009."},{"key":"e_1_3_2_1_35_1","unstructured":"Malte Ubl. Xssinterface: Javascript library for secure cross browser javascript messaging. http:\/\/code.google.com\/p\/xssinterface\/ Jan 2009.  Malte Ubl. Xssinterface: Javascript library for secure cross browser javascript messaging. http:\/\/code.google.com\/p\/xssinterface\/ Jan 2009."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceeding of the 14th ISOC Network and Distributed System Security Symposium","author":"Vogt P.","year":"2007"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294263"},{"key":"e_1_3_2_1_38_1","unstructured":"Yahoo. Pipes. htpp:\/\/pipes.yahoo.com Jan 2009.  Yahoo. Pipes. htpp:\/\/pipes.yahoo.com Jan 2009."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"}],"event":{"name":"EuroSys '09: Fourth EuroSys Conference 2009","location":"Nuremberg Germany","acronym":"EuroSys '09","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 4th ACM European conference on Computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519065.1519091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1519065.1519091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:53Z","timestamp":1750253393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519065.1519091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":38,"alternative-id":["10.1145\/1519065.1519091","10.1145\/1519065"],"URL":"https:\/\/doi.org\/10.1145\/1519065.1519091","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]},"assertion":[{"value":"2009-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}