{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T01:05:03Z","timestamp":1771635903836,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134091","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1709-1723","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Code-Reuse Attacks for the Web"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Lekies","sequence":"first","affiliation":[{"name":"Google, Z\u00fcrich, Switzerland"}]},{"given":"Krzysztof","family":"Kotowicz","sequence":"additional","affiliation":[{"name":"Google, Z\u00fcrich, Switzerland"}]},{"given":"Samuel","family":"Gro\u00df","sequence":"additional","affiliation":[{"name":"SAP, Karlsruhe, Germany"}]},{"given":"Eduardo A.","family":"Vela Nava","sequence":"additional","affiliation":[{"name":"Google, Z\u00fcrich, Switzerland"}]},{"given":"Martin","family":"Johns","sequence":"additional","affiliation":[{"name":"SAP, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"AsiaCCS","author":"Acker S. V.","year":"2016","unstructured":"Acker, S. V., Hausknecht, D., and Sabelfeld, A. Data Exfiltration in the Face of CSP. In AsiaCCS (2016)."},{"key":"e_1_3_2_2_2_1","first-page":"13","volume-title":"Proceedings of the 2010 USENIX conference on Web application development","author":"Athanasopoulos E.","year":"2010","unstructured":"Athanasopoulos, E., Pappas, V., Krithinakis, A., Ligouras, S., Markatos, E. P., and Karagiannis, T. xjs: practical xss prevention for web application development. In Proceedings of the 2010 USENIX conference on Web application development (2010), USENIX Association, pp. 13--13."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772701"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978338"},{"key":"e_1_3_2_2_5_1","unstructured":"CERT\/CC. CERT Advisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests. [online] http:\/\/www.cert.org\/advisories\/CA-2000-02.html (01\/30\/06) February 2000."},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the Workshop of Web","volume":"2","author":"Chen E. Y.","year":"2012","unstructured":"Chen, E. Y., Gorbaty, S., Singhal, A., and Jackson, C. Self-exfiltration: The dangers of browser-enforced information flow control. In Proceedings of the Workshop of Web (2012), vol. 2, Citeseer."},{"key":"e_1_3_2_2_7_1","volume-title":"16th Annual Network and Distributed System Security Symposium (NDSS 2009)","author":"Gundy M. V.","year":"2009","unstructured":"Gundy, M. V., and Chen, H. Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting Attacks. In 16th Annual Network and Distributed System Security Symposium (NDSS 2009) (2009)."},{"key":"e_1_3_2_2_9_1","volume-title":"Jsmvcomfg - to sternly look at javascript mvc and templating frameworks. [online], https:\/\/www.slideshare.net\/x00mario\/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks","author":"Heiderich M.","year":"2013","unstructured":"Heiderich, M. Jsmvcomfg - to sternly look at javascript mvc and templating frameworks. [online], https:\/\/www.slideshare.net\/x00mario\/jsmvcomfg-to-sternly-look-at-javascript-mvc-and-templating-frameworks, 2013."},{"key":"e_1_3_2_2_10_1","volume-title":"Mustache security wiki. [online], https:\/\/github.com\/cure53\/mustache-security","author":"Heiderich M.","year":"2014","unstructured":"Heiderich, M. Mustache security wiki. [online], https:\/\/github.com\/cure53\/mustache-security, 2014."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382276"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516723"},{"key":"e_1_3_2_2_13_1","volume-title":"November","author":"Hickson I.","year":"2013","unstructured":"Hickson, I. The iframe element, November 2013."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242654"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643134"},{"key":"e_1_3_2_2_16_1","first-page":"365","volume":"4","author":"Klein A.","year":"2005","unstructured":"Klein, A. Dom based cross site scripting or xss of the third kind. Web Application Security Consortium, Articles 4 (2005), 365--372.","journal-title":"Articles"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13)","author":"Lekies S.","year":"2013","unstructured":"Lekies, S., Stock, B., and Johns, M. 25 Million Flows Later - Large-scale Detection of DOM-based XSS. In Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13) (2013)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.33"},{"key":"e_1_3_2_2_19_1","unstructured":"Maone G. Noscript 2009."},{"key":"e_1_3_2_2_20_1","unstructured":"MSDN. toStaticHTML method. [API] https:\/\/msdn.microsoft.com\/library\/Cc848922."},{"key":"e_1_3_2_2_21_1","volume-title":"Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In Network & Distributed System Security Symposium (NDSS 2009)","author":"Nadji Y.","year":"2009","unstructured":"Nadji, Y., Saxena, P., and Song, D. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. In Network & Distributed System Security Symposium (NDSS 2009) (2009)."},{"key":"e_1_3_2_2_22_1","unstructured":"Nava E. A. V. Fighting XSS with Isolated Scripts. [online] http:\/\/sirdarckcat.blogspot.de\/2017\/01\/fighting-xss-with-isolated-scripts.html January 2017."},{"key":"e_1_3_2_2_23_1","volume-title":"Our favorite XSS filters\/IDS and how to attack them. Presentation at the BlackHat US conference","author":"Nava E. V.","year":"2009","unstructured":"Nava, E. V., and Lindsay, D. Our favorite XSS filters\/IDS and how to attack them. Presentation at the BlackHat US conference, 2009."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455783"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978384"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786821"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_2_28_1","volume-title":"Ie 8 xss filter architecture\/implementation. Blog: http:\/\/blogs.technet.com\/srd\/archive\/2008\/08\/18\/ie-8-xss-filter-architecture-implementation.aspx","author":"Ross D.","year":"2008","unstructured":"Ross, D. Ie 8 xss filter architecture\/implementation. Blog: http:\/\/blogs.technet.com\/srd\/archive\/2008\/08\/18\/ie-8-xss-filter-architecture-implementation.aspx (2008)."},{"key":"e_1_3_2_2_29_1","volume-title":"Happy 10th birthday cross-site scripting! [online], https:\/\/blogs.msdn.microsoft.com\/dross\/2009\/12\/15\/happy-10th-birthday-cross-site-scripting\/","author":"Ross D.","year":"2009","unstructured":"Ross, D. Happy 10th birthday cross-site scripting! [online], https:\/\/blogs.msdn.microsoft.com\/dross\/2009\/12\/15\/happy-10th-birthday-cross-site-scripting\/, 2009."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772784"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772784"},{"key":"e_1_3_2_2_32_1","volume-title":"23rd USENIX Security Symposium (USENIX Security '14)","author":"Stock B.","year":"2014","unstructured":"Stock, B., Lekies, S., Mueller, T., Spiegel, P., and Johns, M. Precise Client-side Protection against DOM-based Cross-Site Scripting. In 23rd USENIX Security Symposium (USENIX Security '14) (2014)."},{"key":"e_1_3_2_2_33_1","volume-title":"Selectors level 4. W3C Editor","author":"Tantek Celik","year":"2017","unstructured":"Tantek Celik, Daniel Glazman, I. H. P. L. J. W. Selectors level 4. W3C Editor's Draft (2017)."},{"key":"e_1_3_2_2_34_1","first-page":"w3c","author":"Content Content Security Policy","year":"2017","unstructured":"W3C. Content Content Security Policy Level 3. W3C Editor's Draft, 10 May 2017, https:\/\/w3c.github.io\/webappsec-csp\/, May 2017.","journal-title":"C Editor's Draft"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978363"},{"key":"e_1_3_2_2_36_1","first-page":"w3c","author":"Weinberger J.","year":"2017","unstructured":"Weinberger, J., Akhawe, D., and Eisinger, J. Suborigins. W3C Editor's Draft, 18 May 2017, https:\/\/w3c.github.io\/webappsec-suborigins\/, May 2017.","journal-title":"J. Suborigins. W3C Editor's Draft"},{"key":"e_1_3_2_2_37_1","volume-title":"Postcards from the post-xss world. Online at http:\/\/lcamtuf.coredump.cx\/postxss","author":"Zalewski M.","year":"2011","unstructured":"Zalewski, M. Postcards from the post-xss world. Online at http:\/\/lcamtuf.coredump.cx\/postxss (2011)."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134091"}},"subtitle":["Breaking Cross-Site Scripting Mitigations via Script Gadgets"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":36,"alternative-id":["10.1145\/3133956.3134091","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134091","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}