{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:46:50Z","timestamp":1773668810988,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T00:00:00Z","timestamp":1386547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CSR-0849980"],"award-info":[{"award-number":["CSR-0849980"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,12,9]]},"DOI":"10.1145\/2523649.2523683","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T20:44:07Z","timestamp":1389041047000},"page":"349-358","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Auto-FBI"],"prefix":"10.1145","author":[{"given":"Mohsen","family":"Zohrevandi","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ"}]},{"given":"Rida A.","family":"Bazzi","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ"}]}],"member":"320","published-online":{"date-parts":[[2013,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455782"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059965"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.50"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046734"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_8_1","volume-title":"JavaScript: the definitive guide","author":"Flanagan D.","year":"2011","unstructured":"D. Flanagan . JavaScript: the definitive guide . O'Reilly Media , 2011 . D. Flanagan. JavaScript: the definitive guide. O'Reilly Media, 2011."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2003 Network and Distributed Systems Security Symposium, volume 33 of NDSS'03","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel . Traps and pitfalls: Practical problems in system call interposition based security tools . In Proceedings of the 2003 Network and Distributed Systems Security Symposium, volume 33 of NDSS'03 , 2003 . T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In Proceedings of the 2003 Network and Distributed Systems Security Symposium, volume 33 of NDSS'03, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809870"},{"key":"e_1_3_2_1_11_1","unstructured":"Internet Engineering Task Force (IETF). Request for Comments: 6265.  Internet Engineering Task Force (IETF). Request for Comments: 6265."},{"key":"e_1_3_2_1_12_1","first-page":"6454","author":"Internet Engineering Task Force (IETF).","year":"2011","unstructured":"Internet Engineering Task Force (IETF). Request for Comments : 6454 , 2011 . Internet Engineering Task Force (IETF). Request for Comments: 6454, 2011.","journal-title":"Request for Comments"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462148.1462150"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866339"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0076-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh169"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Proceedings of the 2008 Security Symposium, SS'08","author":"Provos N.","year":"2008","unstructured":"N. Provos , P. Mavrommatis , M. A. Rajab , and F. Monrose . All your iframes point to us . In Proceedings of the 2008 Security Symposium, SS'08 , pages 1 -- 15 , 2008 . N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iframes point to us. In Proceedings of the 2008 Security Symposium, SS'08, pages 1--15, 2008."},{"key":"e_1_3_2_1_18_1","first-page":"2","author":"Rydstedt G.","year":"2010","unstructured":"G. Rydstedt , E. Bursztein , D. Boneh , and C. Jackson . Busting frame busting: a study of clickjacking vulnerabilities at popular sites. IEEE Oakland Web , 2 , 2010 . G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. IEEE Oakland Web, 2, 2010.","journal-title":"IEEE Oakland Web"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.23"}],"event":{"name":"ACSAC '13: Annual Computer Security Applications Conference","location":"New Orleans Louisiana USA","acronym":"ACSAC '13","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 29th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523683","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2523649.2523683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:03Z","timestamp":1750232043000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2523649.2523683"}},"subtitle":["a user-friendly approach for secure access to sensitive content on the web"],"short-title":[],"issued":{"date-parts":[[2013,12,9]]},"references-count":19,"alternative-id":["10.1145\/2523649.2523683","10.1145\/2523649"],"URL":"https:\/\/doi.org\/10.1145\/2523649.2523683","relation":{},"subject":[],"published":{"date-parts":[[2013,12,9]]},"assertion":[{"value":"2013-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}