{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:14:04Z","timestamp":1777500844179,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,13]],"date-time":"2010-04-13T00:00:00Z","timestamp":1271116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["P18764"],"award-info":[{"award-number":["P18764"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["FP7-ICT-216026-WOMBATFP7-ICT-216331-FORWARD"],"award-info":[{"award-number":["FP7-ICT-216026-WOMBATFP7-ICT-216331-FORWARD"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,13]]},"DOI":"10.1145\/1755688.1755706","type":"proceedings-article","created":{"date-parts":[[2010,4,16]],"date-time":"2010-04-16T14:28:35Z","timestamp":1271428115000},"page":"135-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["A solution for the automated detection of clickjacking attacks"],"prefix":"10.1145","author":[{"given":"Marco","family":"Balduzzi","sequence":"first","affiliation":[{"name":"Institute Eurecom, Sophia-Antipolis"}]},{"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[{"name":"Technical University Vienna"}]},{"given":"Engin","family":"Kirda","sequence":"additional","affiliation":[{"name":"Institute Eurecom, Sophia-Antipolis"}]},{"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"Institute Eurecom, Sophia-Antipolis"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]}],"member":"320","published-online":{"date-parts":[[2010,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Acutenix web security scanner. http:\/\/www.acunetix.com\/.  Acutenix web security scanner. http:\/\/www.acunetix.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa top sites. http:\/\/www.alexa.com\/topsites.  Alexa top sites. http:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_3_1","unstructured":"Malware domain blocklist. http:\/\/www.malwaredomains.com\/.  Malware domain blocklist. http:\/\/www.malwaredomains.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Myspace. http:\/\/www.myspace.com.  Myspace. http:\/\/www.myspace.com."},{"key":"e_1_3_2_1_5_1","unstructured":"Nikto. http:\/\/www.cirt.net\/nikto2.  Nikto. http:\/\/www.cirt.net\/nikto2."},{"key":"e_1_3_2_1_6_1","unstructured":"Phishtank: Join the fight against phishing. http:\/\/www.phishtank.com\/.  Phishtank: Join the fight against phishing. http:\/\/www.phishtank.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Selenium web application testing system. http:\/\/seleniumhq.org\/.  Selenium web application testing system. http:\/\/seleniumhq.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Watir automated webbrowsers. http:\/\/wtr.rubyforge.org\/.  Watir automated webbrowsers. http:\/\/wtr.rubyforge.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"xdotool. http:\/\/www.semicomplete.com\/projects\/xdotool\/.  xdotool. http:\/\/www.semicomplete.com\/projects\/xdotool\/."},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/www.blogger.com 2009.  http:\/\/www.blogger.com 2009."},{"key":"e_1_3_2_1_11_1","unstructured":"Alexa Internet Inc. Alexa - top sites by category. http:\/\/www.alexa.com\/topsites\/category\/Top\/ 2009.  Alexa Internet Inc. Alexa - top sites by category. http:\/\/www.alexa.com\/topsites\/category\/Top\/ 2009."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.22"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11790754_2"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2003","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel and M. Rosenblum . A virtual machine introspection based architecture for intrusion detection . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2003 , San Diego, California, USA , 2003 . T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA, 2003."},{"key":"e_1_3_2_1_15_1","unstructured":"R. Hansen. Clickjacking details. http:\/\/ha.ckers.org\/blog\/20081007\/clickjacking-details\/ 2008.  R. Hansen. Clickjacking details. http:\/\/ha.ckers.org\/blog\/20081007\/clickjacking-details\/ 2008."},{"key":"e_1_3_2_1_16_1","unstructured":"R. Hansen and J. Grossman. Clickjacking. http:\/\/www.sectheory.com\/clickjacking.htm 09 2008.  R. Hansen and J. Grossman. Clickjacking. http:\/\/www.sectheory.com\/clickjacking.htm 09 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775174"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/anubis.iseclab.org","author":"Systems Lab International Secure","year":"2009","unstructured":"International Secure Systems Lab . http:\/\/anubis.iseclab.org , 2009 . International Secure Systems Lab. http:\/\/anubis.iseclab.org, 2009."},{"key":"e_1_3_2_1_20_1","volume-title":"September","author":"Grossman Jeremiah","year":"2008","unstructured":"Jeremiah Grossman . (Cancelled) Clickjacking - OWASP AppSec Talk . http:\/\/jeremiahgrossman.blogspot.com\/2009\/06\/clickjacking-2017.html , September 2008 . Jeremiah Grossman. (Cancelled) Clickjacking - OWASP AppSec Talk. http:\/\/jeremiahgrossman.blogspot.com\/2009\/06\/clickjacking-2017.html, September 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"June","author":"Grossman Jeremiah","year":"2009","unstructured":"Jeremiah Grossman . Clickjacking 2017. http:\/\/jeremiahgrossman.blogspot.com\/2009\/06\/clickjacking-2017.html , June 2009 . Jeremiah Grossman. Clickjacking 2017. http:\/\/jeremiahgrossman.blogspot.com\/2009\/06\/clickjacking-2017.html, June 2009."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135817"},{"key":"e_1_3_2_1_24_1","first-page":"2","article-title":"Don't Click","author":"Mahemoff M.","year":"2009","unstructured":"M. Mahemoff . Explaining the \" Don't Click \" Clickjacking Tweetbomb. http:\/\/softwareas.com\/explaining-the-dont-click-clickjacking-tweetbomb , 2 2009 . M. Mahemoff. Explaining the \"Don't Click\" Clickjacking Tweetbomb. http:\/\/softwareas.com\/explaining-the-dont-click-clickjacking-tweetbomb, 2 2009.","journal-title":"Clickjacking Tweetbomb. http:\/\/softwareas.com\/explaining-the-dont-click-clickjacking-tweetbomb"},{"key":"e_1_3_2_1_25_1","unstructured":"G. Maone. Hello ClearClick Goodbye Clickjacking! http:\/\/hackademix.net\/2008\/10\/08\/hello-clearclick-goodbye-clickjacking\/ 10 2008.  G. Maone. Hello ClearClick Goodbye Clickjacking! http:\/\/hackademix.net\/2008\/10\/08\/hello-clearclick-goodbye-clickjacking\/ 10 2008."},{"key":"e_1_3_2_1_26_1","unstructured":"G. Maone. X-frame-options in firefox. http:\/\/hackademix.net\/2009\/01\/29\/x-frame-options-in-firefox\/ 2009.  G. Maone. X-frame-options in firefox. http:\/\/hackademix.net\/2009\/01\/29\/x-frame-options-in-firefox\/ 2009."},{"key":"e_1_3_2_1_27_1","unstructured":"Microsoft. IE8 Clickjacking Defense. http:\/\/blogs.msdn.com\/ie\/archive\/2009\/01\/27\/ie8-security-part-vii-clickjacking-defenses.aspx 01 2009.  Microsoft. IE8 Clickjacking Defense. http:\/\/blogs.msdn.com\/ie\/archive\/2009\/01\/27\/ie8-security-part-vii-clickjacking-defenses.aspx 01 2009."},{"key":"e_1_3_2_1_28_1","unstructured":"Microsoft Corporation. Security attribute (frame iframe htmldocument constructor). http:\/\/msdn.microsoft.com\/en-us\/library\/ms534622(VS.85).aspx.  Microsoft Corporation. Security attribute (frame iframe htmldocument constructor). http:\/\/msdn.microsoft.com\/en-us\/library\/ms534622(VS.85).aspx."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2006","author":"Moshchuk A.","year":"2006","unstructured":"A. Moshchuk , T. Bragin , S. D. Gribble , and H. M. Levy . A crawler-based study of spyware in the web . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2006 , San Diego, California, USA , 2006 . A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware in the web. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006."},{"key":"e_1_3_2_1_30_1","volume-title":"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=154957","author":"Foundation Mozilla","year":"2002","unstructured":"Mozilla Foundation . https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=154957 , 2002 . Mozilla Foundation. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=154957, 2002."},{"key":"e_1_3_2_1_31_1","unstructured":"J. Nielsen. The same origin policy. http:\/\/www.mozilla.org\/projects\/security\/components\/same-origin.html 2001.  J. Nielsen. The same origin policy. http:\/\/www.mozilla.org\/projects\/security\/components\/same-origin.html 2001."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323132"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381476"},{"key":"e_1_3_2_1_34_1","unstructured":"US-CERT. CVE-2008-4503: Adobe Flash Player Clickjacking Vulnerability. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008-4503 10 2008.  US-CERT. CVE-2008-4503: Adobe Flash Player Clickjacking Vulnerability. http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2008-4503 10 2008."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2007","author":"Vogt P.","year":"2007","unstructured":"P. Vogt , F. Nentwich , N. Jovanovic , E. Kirda , C. Kruegel , and G. Vigna . Cross site scripting prevention with dynamic data tainting and static analysis . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2007 , San Diego, California, USA, 28th February -- 2nd March 2007 , 2007. P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2007, San Diego, California, USA, 28th February -- 2nd March 2007, 2007."},{"key":"e_1_3_2_1_36_1","volume-title":"IN NDSS","author":"Wang Y.-M.","year":"2006","unstructured":"Y.-M. Wang , D. Beck , X. Jiang , and R. Roussev . Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities . In IN NDSS , 2006 . Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In IN NDSS, 2006."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250739"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390661"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267349"},{"key":"e_1_3_2_1_40_1","unstructured":"M. Zalewski. Browser security handbook part 2. http:\/\/code.google.com\/p\/browsersec\/wiki\/Part2#Arbitrary_page_mashups_(UI_redressing) 2008.  M. Zalewski. Browser security handbook part 2. http:\/\/code.google.com\/p\/browsersec\/wiki\/Part2#Arbitrary_page_mashups_(UI_redressing) 2008."},{"key":"e_1_3_2_1_41_1","unstructured":"M. Zalewski. Dealing with UI redress vulnerabilities inherent to the current web. http:\/\/lists.whatwg.org\/htdig.cgi\/whatwg-whatwg.org\/2008-September\/016284.html 09 2008.  M. Zalewski. Dealing with UI redress vulnerabilities inherent to the current web. http:\/\/lists.whatwg.org\/htdig.cgi\/whatwg-whatwg.org\/2008-September\/016284.html 09 2008."}],"event":{"name":"ASIA CCS '10: 5th ACM Symposium on Information, Computer and Communications Security","location":"Beijing China","acronym":"ASIA CCS '10","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1755688.1755706","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1755688.1755706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:30Z","timestamp":1750250730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1755688.1755706"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,13]]},"references-count":41,"alternative-id":["10.1145\/1755688.1755706","10.1145\/1755688"],"URL":"https:\/\/doi.org\/10.1145\/1755688.1755706","relation":{},"subject":[],"published":{"date-parts":[[2010,4,13]]},"assertion":[{"value":"2010-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}