{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:54Z","timestamp":1750307094791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2381913.2381921","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T13:41:01Z","timestamp":1350654061000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploiting split browsers for efficiently protecting user data"],"prefix":"10.1145","author":[{"given":"Angeliki","family":"Zavou","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SPDY\n  : An experimental protocol for a faster web. The Chromium Projects. http:\/\/www.chromium.org\/spdy\/spdy-whitepaper\/.  SPDY: An experimental protocol for a faster web. The Chromium Projects. http:\/\/www.chromium.org\/spdy\/spdy-whitepaper\/."},{"key":"e_1_3_2_1_2_1","volume-title":"April","author":"Icentrix Internet Appliance","year":"1999","unstructured":"Internet Appliance - new cheap Internet access for schools from Icentrix . trainingzone , April 1999 . http:\/\/www.trainingzone.co.uk\/item\/3756. Internet Appliance - new cheap Internet access for schools from Icentrix. trainingzone, April 1999. http:\/\/www.trainingzone.co.uk\/item\/3756."},{"key":"e_1_3_2_1_3_1","volume-title":"More Mobile Internet Users Than Wireline Users in the U.S. by","author":"IDC","year":"2015","unstructured":"IDC : More Mobile Internet Users Than Wireline Users in the U.S. by 2015 , September 2011. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS23028711. IDC: More Mobile Internet Users Than Wireline Users in the U.S. by 2015, September 2011. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS23028711."},{"key":"e_1_3_2_1_4_1","volume-title":"Apple Loses Grip. ANDROID AUTHORITY","author":"Report Suppli","year":"2012","unstructured":"i Suppli Report : Kindle Fire Takes Off , Apple Loses Grip. ANDROID AUTHORITY , February 2012 . http:\/\/www.androidauthority.com\/isuppli-kindle-fire-gaining-on-ipad-54230\/. iSuppli Report: Kindle Fire Takes Off, Apple Loses Grip. ANDROID AUTHORITY, February 2012. http:\/\/www.androidauthority.com\/isuppli-kindle-fire-gaining-on-ipad-54230\/."},{"key":"e_1_3_2_1_5_1","volume-title":"RSA, Febrary","author":"Alperovitch D.","year":"2012","unstructured":"D. Alperovitch and G. Kurtz . Hacking Exposed: Mobile RAT Edition . In RSA, Febrary 2012 . D. Alperovitch and G. Kurtz. Hacking Exposed: Mobile RAT Edition. In RSA, Febrary 2012."},{"key":"e_1_3_2_1_6_1","volume-title":"October","author":"Auerbach D.","year":"2011","unstructured":"D. Auerbach . EFF Gets Straight Privacy Answers From Amazon About New \"Silk\" Tablet Browser. https:\/\/www.eff.org\/2011\/october\/amazon-fire%E2%80%99s-new-browser-puts-spotlight-privacy-trade-offs , October 2011 . D. Auerbach. EFF Gets Straight Privacy Answers From Amazon About New \"Silk\" Tablet Browser. https:\/\/www.eff.org\/2011\/october\/amazon-fire%E2%80%99s-new-browser-puts-spotlight-privacy-trade-offs, October 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of WebApps'10","author":"Davis B.","year":"2010","unstructured":"B. Davis and H. Chen . DBTaint: cross-application information flow tracking via databases . In Proc. of WebApps'10 , June 2010 . B. Davis and H. Chen. DBTaint: cross-application information flow tracking via databases. In Proc. of WebApps'10, June 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"Arstechnica","author":"Goodin D.","year":"2012","unstructured":"D. Goodin . At hacking contest, Google Chrome falls to third zero-day attack . Arstechnica , March 2012 . http:\/\/arstechnica.com\/business\/2012\/03\/googles-chrome-browser-on-friday\/. D. Goodin. At hacking contest, Google Chrome falls to third zero-day attack. Arstechnica, March 2012. http:\/\/arstechnica.com\/business\/2012\/03\/googles-chrome-browser-on-friday\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of the 16th NDSS","author":"Gundy M. V.","year":"2009","unstructured":"M. V. Gundy and H. Chen . Noncespaces: Using randomization to enforce information flow tracking and thwart cross-site scripting attacks . In Proc. of the 16th NDSS , February 2009 . M. V. Gundy and H. Chen. Noncespaces: Using randomization to enforce information flow tracking and thwart cross-site scripting attacks. In Proc. of the 16th NDSS, February 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242654"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_16_1","volume-title":"November","author":"Amazon Silk A. Ku.","year":"2011","unstructured":"A. Ku. Amazon Silk : Assisted Web Browsing (Sort Of). tom's hardware http:\/\/www.tomshardware.com\/reviews\/amazon-kindle-fire-review,3076-7.html , November 2011 . A. Ku. Amazon Silk: Assisted Web Browsing (Sort Of). tom's hardware http:\/\/www.tomshardware.com\/reviews\/amazon-kindle-fire-review,3076-7.html, November 2011."},{"key":"e_1_3_2_1_17_1","volume-title":"Metasploit","author":"Moore H.","year":"2010","unstructured":"H. Moore . Cracking the iPhone (part 1) . Metasploit , October 2010 . https:\/\/community.rapid7.com\/community\/metasploit\/blog\/2007\/10\/11\/cracking-the-iphone-part-1. H. Moore. Cracking the iPhone (part 1). Metasploit, October 2010. https:\/\/community.rapid7.com\/community\/metasploit\/blog\/2007\/10\/11\/cracking-the-iphone-part-1."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of 3rd HotCloud","author":"Mundada Y.","year":"2011","unstructured":"Y. Mundada , A. Ramachandran , and N. Feamster . SilverLine: Data and network isolation for cloud services . In Proc. of 3rd HotCloud , June 2011 . Y. Mundada, A. Ramachandran, and N. Feamster. SilverLine: Data and network isolation for cloud services. In Proc. of 3rd HotCloud, June 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of the 16th NDSS","author":"Nadji Y.","year":"2009","unstructured":"Y. Nadji , P. Saxena , and D. Song . Document Structure Integrity: A robust basis for cross-site scripting defense . In Proc. of the 16th NDSS , February 2009 . Y. Nadji, P. Saxena, and D. Song. Document Structure Integrity: A robust basis for cross-site scripting defense. In Proc. of the 16th NDSS, February 2009."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of the 14th NDSS","author":"Nentwich F.","year":"2007","unstructured":"F. Nentwich , N. Jovanovic , E. Kirda , C. Kruegel , and G. Vigna . Cross-site scripting prevention with dynamic data tainting and static analysis . In Proc. of the 14th NDSS , February 2007 . F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proc. of the 14th NDSS, February 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of the 12th NDSS","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In Proc. of the 12th NDSS , February 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of the 12th NDSS, February 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920313"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the 16th NDSS","author":"Sekar R.","year":"2009","unstructured":"R. Sekar . An efficient black-box technique for defeating web application attacks . In Proc. of the 16th NDSS , February 2009 . R. Sekar. An efficient black-box technique for defeating web application attacks. In Proc. of the 16th NDSS, February 2009."},{"key":"e_1_3_2_1_24_1","unstructured":"Site Specific Browser. Turn any web site into a Windows Program or Mac App. http:\/\/sitespecificbrowser.com\/.  Site Specific Browser. Turn any web site into a Windows Program or Mac App. http:\/\/sitespecificbrowser.com\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.33"},{"volume-title":"Social Hacking","year":"2011","key":"e_1_3_2_1_26_1","unstructured":"theharmonyhuy. Recent Facebook XSS Attacks Show Increasing Sophistication . Social Hacking , April 2011 . http:\/\/theharmonyguy.com\/oldsite\/2011\/04\/21\/recent-facebook-xss-attacks-show-increasing-sophistication\/. theharmonyhuy. Recent Facebook XSS Attacks Show Increasing Sophistication. Social Hacking, April 2011. http:\/\/theharmonyguy.com\/oldsite\/2011\/04\/21\/recent-facebook-xss-attacks-show-increasing-sophistication\/."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.471"},{"issue":"5","key":"e_1_3_2_1_28_1","first-page":"18","article-title":"Benchmarking Amazon EC2 for high-performance scientific computing","volume":"33","author":"Walker E.","year":"2008","unstructured":"E. Walker . Benchmarking Amazon EC2 for high-performance scientific computing . LOGIN , 33 ( 5 ): 18 -- 23 , October 2008 . E. Walker. Benchmarking Amazon EC2 for high-performance scientific computing. LOGIN, 33(5):18--23, October 2008.","journal-title":"LOGIN"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the 15th USENIX Security Symposium","author":"Xu W.","year":"2006","unstructured":"W. Xu , S. Bhatkar , and R. Sekar . Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks . In Proc. of the 15th USENIX Security Symposium , July 2006 . W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In Proc. of the 15th USENIX Security Symposium, July 2006."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2075658.2075670"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of 7th OSDI","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making information flow explicit in HiStar . In Proc. of 7th OSDI , November 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making information flow explicit in HiStar. In Proc. of 7th OSDI, November 2006."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 2012 ACM Workshop on Cloud computing security workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381913.2381921","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381913.2381921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:40Z","timestamp":1750239280000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381913.2381921"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":33,"alternative-id":["10.1145\/2381913.2381921","10.1145\/2381913"],"URL":"https:\/\/doi.org\/10.1145\/2381913.2381921","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}