{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:11:55Z","timestamp":1769728315072,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3447852.3458718","type":"proceedings-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:54:20Z","timestamp":1619344460000},"page":"27-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Talking About My Generation"],"prefix":"10.1145","author":[{"given":"Souphiane","family":"Bensalim","sequence":"first","affiliation":[{"name":"SAP Security Research"}]},{"given":"David","family":"Klein","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Braunschweig"}]},{"given":"Thomas","family":"Barber","sequence":"additional","affiliation":[{"name":"SAP Security Research"}]},{"given":"Martin","family":"Johns","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Braunschweig"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"4","article-title":"Edgescan","volume":"2020","year":"2020","unstructured":"2020 . Edgescan : Vulnerability Stats Report. Network Security 2020 , 3 (2020), 4 . https:\/\/doi.org\/10.1016\/S1353--4858(20)30027--1 2020. Edgescan: Vulnerability Stats Report. Network Security 2020, 3 (2020), 4. https:\/\/doi.org\/10.1016\/S1353--4858(20)30027--1","journal-title":"Vulnerability Stats Report. Network Security"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772701"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Tim Berners-Lee Larry Masinter and Mark McCahill. 1994. RFC1738: Uniform Resource Locators (URL).  Tim Berners-Lee Larry Masinter and Mark McCahill. 1994. RFC1738: Uniform Resource Locators (URL).","DOI":"10.17487\/rfc1738"},{"key":"e_1_3_2_1_4_1","unstructured":"Stefano Di Paola. 2012. DominatorPro: Securing Next Generation of Web Applications. http:\/\/web.archive.org\/web\/20120712202421\/https:\/\/dominator.mindedsecurity.com.  Stefano Di Paola. 2012. DominatorPro: Securing Next Generation of Web Applications. http:\/\/web.archive.org\/web\/20120712202421\/https:\/\/dominator.mindedsecurity.com."},{"key":"e_1_3_2_1_5_1","volume-title":"Explainer: Trusted Types for DOM Manipulation. https:\/\/github.com\/WICG\/trusted-types.","author":"Web Incubator Community Group","year":"2017","unstructured":"Web Incubator Community Group . 2017 . Explainer: Trusted Types for DOM Manipulation. https:\/\/github.com\/WICG\/trusted-types. Web Incubator Community Group. 2017. Explainer: Trusted Types for DOM Manipulation. https:\/\/github.com\/WICG\/trusted-types."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_7"},{"key":"e_1_3_2_1_7_1","first-page":"365","article-title":"DOM based cross site scripting or XSS of the third kind","volume":"4","author":"Klein Amit","year":"2005","unstructured":"Amit Klein . 2005 . DOM based cross site scripting or XSS of the third kind . Web Application Security Consortium, Articles 4 (2005), 365 -- 372 . Amit Klein. 2005. DOM based cross site scripting or XSS of the third kind. Web Application Security Consortium, Articles 4 (2005), 365--372.","journal-title":"Web Application Security Consortium, Articles"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23309"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450062"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329841"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_13_1","volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 713--727.","author":"Schwenk J\u00f6rg","unstructured":"J\u00f6rg Schwenk , Marcus Niemietz , and Christian Mainka . 2017. Same-origin policy: Evaluation in modern browsers . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 713--727. J\u00f6rg Schwenk, Marcus Niemietz, and Christian Mainka. 2017. Same-origin policy: Evaluation in modern browsers. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 713--727."},{"key":"e_1_3_2_1_14_1","unstructured":"statcounter. 2021. Desktop Browser Market Share Worldwide | StatCounter Global Stats. https:\/\/gs.statcounter.com\/browser-market-share\/desktop\/worldwide. (Accessed on 03\/28\/2021).  statcounter. 2021. Desktop Browser Market Share Worldwide | StatCounter Global Stats. https:\/\/gs.statcounter.com\/browser-market-share\/desktop\/worldwide. (Accessed on 03\/28\/2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23009"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of USENIX Security Symposium. 971--987","author":"Stock Ben","year":"2017","unstructured":"Ben Stock , Martin Johns , Marius Steffens , and Michael Backes . 2017 . How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security .. In Proc. of USENIX Security Symposium. 971--987 . Ben Stock, Martin Johns, Marius Steffens, and Michael Backes. 2017. How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security.. In Proc. of USENIX Security Symposium. 971--987."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of USENIX Security Symposium. 655--670","author":"Stock Ben","year":"2014","unstructured":"Ben Stock , Sebastian Lekies , Tobias Mueller , Patrick Spiegel , and Martin Johns . 2014 . Precise Client-side Protection against DOM-based Cross-Site Scripting .. In Proc. of USENIX Security Symposium. 655--670 . Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns. 2014. Precise Client-side Protection against DOM-based Cross-Site Scripting.. In Proc. of USENIX Security Symposium. 655--670."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813625"},{"key":"e_1_3_2_1_19_1","volume-title":"NDSS","volume":"2007","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt , Florian Nentwich , Nenad Jovanovic , Engin Kirda , Christopher Kruegel , and Giovanni Vigna . 2007 . Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis .. In NDSS , Vol. 2007 . 12. Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2007. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.. In NDSS, Vol. 2007. 12."},{"key":"e_1_3_2_1_20_1","unstructured":"Michal Zalewski. 2012. The tangled Web: A guide to securing modern web applications. No Starch Press.  Michal Zalewski. 2012. The tangled Web: A guide to securing modern web applications. No Starch Press."}],"event":{"name":"EuroSys '21: Sixteenth European Conference on Computer Systems","location":"Online United Kingdom","acronym":"EuroSys '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 14th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447852.3458718","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447852.3458718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:27Z","timestamp":1750268967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447852.3458718"}},"subtitle":["Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":20,"alternative-id":["10.1145\/3447852.3458718","10.1145\/3447852"],"URL":"https:\/\/doi.org\/10.1145\/3447852.3458718","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}