{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:39:47Z","timestamp":1774967987767,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T00:00:00Z","timestamp":1361145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,2,18]]},"DOI":"10.1145\/2435349.2435365","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T14:32:38Z","timestamp":1361284358000},"page":"129-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["TamperProof"],"prefix":"10.1145","author":[{"given":"Nazari","family":"Skrupsky","sequence":"first","affiliation":[{"name":"University of Illinois at Chicago, Chicago, USA"}]},{"given":"Prithvi","family":"Bisht","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, USA"}]},{"given":"Timothy","family":"Hinrichs","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, USA"}]},{"given":"V. N.","family":"Venkatakrishnan","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, USA"}]},{"given":"Lenore","family":"Zuck","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,2,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Open Web Application Security Project (OWASP) AppSensor. https:\/\/www.owasp.org\/index.php\/Category:OWASP_AppSensor_Project.  Open Web Application Security Project (OWASP) AppSensor. https:\/\/www.owasp.org\/index.php\/Category:OWASP_AppSensor_Project."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/secwebapps.com","author":"TamperProof","year":"2012","unstructured":"TamperProof demo site. http:\/\/secwebapps.com , 2012 . TamperProof demo site. http:\/\/secwebapps.com, 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336760"},{"key":"e_1_3_2_1_4_1","volume-title":"Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium","author":"Bethea D.","year":"2010","unstructured":"Bethea , D. , Cochran , R. , and Reiter , M . Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium ( San Diego, CA, USA , 2010 ). Bethea, D., Cochran, R., and Reiter, M. Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2010)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866375"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046774"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294265"},{"key":"e_1_3_2_1_8_1","volume-title":"Links: Web Programming Without Tiers. In FMCO'06: Proceedings of the International Symposium on Formal Methods for Components and Objects","author":"Cooper E.","year":"2006","unstructured":"Cooper , E. , Lindley , S. , Wadler , P. , and Yallop , J . Links: Web Programming Without Tiers. In FMCO'06: Proceedings of the International Symposium on Formal Methods for Components and Objects ( Amsterdam, The Netherlands , 2006 ). Cooper, E., Lindley, S., Wadler, P., and Yallop, J. Links: Web Programming Without Tiers. In FMCO'06: Proceedings of the International Symposium on Formal Methods for Components and Objects (Amsterdam, The Netherlands, 2006)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559875"},{"key":"e_1_3_2_1_10_1","volume-title":"Detecting Manipulated Remote Call Streams. In Security'02: Proceedings of the 11th USENIX Security Symposium","author":"Giffin J. T.","year":"2002","unstructured":"Giffin , J. T. , Jha , S. , and Miller , B. P . Detecting Manipulated Remote Call Streams. In Security'02: Proceedings of the 11th USENIX Security Symposium ( Berkeley, CA, USA , 2002 ). Giffin, J. T., Jha, S., and Miller, B. P. Detecting Manipulated Remote Call Streams. In Security'02: Proceedings of the 11th USENIX Security Symposium (Berkeley, CA, USA, 2002)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526785"},{"key":"e_1_3_2_1_12_1","volume-title":"OWASP'06: Proceedings of the OWASP Europe 2006 Conference","author":"Johns M.","year":"2006","unstructured":"Johns , M. , and Winter , J . RequestRodeo: Client Side Protection against Session Riding . In OWASP'06: Proceedings of the OWASP Europe 2006 Conference ( Leuven, Belgium , 2006 ). Johns, M., and Winter, J. RequestRodeo: Client Side Protection against Session Riding. In OWASP'06: Proceedings of the OWASP Europe 2006 Conference (Leuven, Belgium, 2006)."},{"key":"e_1_3_2_1_13_1","volume-title":"Preventing Cross-site Request Forgery Attacks. In SecureComm'06: Proceedings of the Second IEEE Conference on Security and Privacy in Communications Networks","author":"Jovanovic N.","year":"2006","unstructured":"Jovanovic , N. , Kirda , E. , and Kruegel , C . Preventing Cross-site Request Forgery Attacks. In SecureComm'06: Proceedings of the Second IEEE Conference on Security and Privacy in Communications Networks ( Baltimore, MD, USA , 2006 ). Jovanovic, N., Kirda, E., and Kruegel, C. Preventing Cross-site Request Forgery Attacks. In SecureComm'06: Proceedings of the Second IEEE Conference on Security and Privacy in Communications Networks (Baltimore, MD, USA, 2006)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.56"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.38"},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/blog.plataformatec.com.br\/2010\/06\/simpleform-forms-made-easy\/","author":"Simpleform","year":"2011","unstructured":"Simpleform website. http:\/\/blog.plataformatec.com.br\/2010\/06\/simpleform-forms-made-easy\/ , 2011 . Simpleform website. http:\/\/blog.plataformatec.com.br\/2010\/06\/simpleform-forms-made-easy\/, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653685"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.26"}],"event":{"name":"CODASPY'13: Third ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the third ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2435349.2435365","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2435349.2435365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:57Z","timestamp":1750234737000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2435349.2435365"}},"subtitle":["a server-agnostic defense for parameter tampering attacks on web applications"],"short-title":[],"issued":{"date-parts":[[2013,2,18]]},"references-count":18,"alternative-id":["10.1145\/2435349.2435365","10.1145\/2435349"],"URL":"https:\/\/doi.org\/10.1145\/2435349.2435365","relation":{},"subject":[],"published":{"date-parts":[[2013,2,18]]},"assertion":[{"value":"2013-02-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}