{"id":"https://openalex.org/W2051062685","doi":"https://doi.org/10.1109/pst.2014.6890948","title":"Detection and mitigation of malicious JavaScript using information flow control","display_name":"Detection and mitigation of malicious JavaScript using information flow control","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W2051062685","doi":"https://doi.org/10.1109/pst.2014.6890948","mag":"2051062685"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2014.6890948","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018172820","display_name":"Bassam Sayed","orcid":null},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Bassam Sayed","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","[Dept. of Electrical & Computer Engineering, University of Victoria, BC, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]},{"raw_affiliation_string":"[Dept. of Electrical & Computer Engineering, University of Victoria, BC, Canada]","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041277719","display_name":"Issa Traor\u00e9","orcid":"https://orcid.org/0000-0003-2987-8047"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Issa Traore","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","[Dept. of Electrical & Computer Engineering, University of Victoria, BC, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]},{"raw_affiliation_string":"[Dept. of Electrical & Computer Engineering, University of Victoria, BC, Canada]","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063103933","display_name":"Amany Abdelhalim","orcid":null},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amany Abdelhalim","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","[Dept. of Electrical & Computer Engineering, University of Victoria, BC, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]},{"raw_affiliation_string":"[Dept. of Electrical & Computer Engineering, University of Victoria, BC, Canada]","institution_ids":["https://openalex.org/I212119943"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018172820"],"corresponding_institution_ids":["https://openalex.org/I212119943"],"apc_list":null,"apc_paid":null,"fwci":0.8734,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74335976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"264","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.9447450041770935},{"id":"https://openalex.org/keywords/unobtrusive-javascript","display_name":"Unobtrusive JavaScript","score":0.8645554780960083},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8356446027755737},{"id":"https://openalex.org/keywords/interactivity","display_name":"Interactivity","score":0.6301589608192444},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.5620084404945374},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5615621209144592},{"id":"https://openalex.org/keywords/rich-internet-application","display_name":"Rich Internet application","score":0.5475266575813293},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5409918427467346},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.4798519015312195},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.4241664707660675},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42385390400886536},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14386048913002014}],"concepts":[{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.9447450041770935},{"id":"https://openalex.org/C198240166","wikidata":"https://www.wikidata.org/wiki/Q2298909","display_name":"Unobtrusive JavaScript","level":4,"score":0.8645554780960083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8356446027755737},{"id":"https://openalex.org/C144430266","wikidata":"https://www.wikidata.org/wiki/Q839721","display_name":"Interactivity","level":2,"score":0.6301589608192444},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5620084404945374},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5615621209144592},{"id":"https://openalex.org/C103048170","wikidata":"https://www.wikidata.org/wiki/Q725485","display_name":"Rich Internet application","level":3,"score":0.5475266575813293},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5409918427467346},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.4798519015312195},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.4241664707660675},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42385390400886536},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14386048913002014},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pst.2014.6890948","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890948","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W58852127","https://openalex.org/W1222699389","https://openalex.org/W1546773937","https://openalex.org/W1554476771","https://openalex.org/W1839269954","https://openalex.org/W1970867218","https://openalex.org/W2032095999","https://openalex.org/W2044675702","https://openalex.org/W2094873755","https://openalex.org/W2095610745","https://openalex.org/W2108810805","https://openalex.org/W2113167642","https://openalex.org/W2116761843","https://openalex.org/W2118431434","https://openalex.org/W2121780525","https://openalex.org/W2129345992","https://openalex.org/W2133723082","https://openalex.org/W2156249516","https://openalex.org/W2162316255","https://openalex.org/W2169771430","https://openalex.org/W2405466026","https://openalex.org/W4247465700","https://openalex.org/W6602413418","https://openalex.org/W6627779323","https://openalex.org/W6632499521","https://openalex.org/W6633188775","https://openalex.org/W6638589906","https://openalex.org/W6676915735","https://openalex.org/W6679383699","https://openalex.org/W6683183931","https://openalex.org/W6713572482"],"related_works":["https://openalex.org/W650647575","https://openalex.org/W597036300","https://openalex.org/W2477981260","https://openalex.org/W36303035","https://openalex.org/W2617623045","https://openalex.org/W4231812305","https://openalex.org/W2505509890","https://openalex.org/W827014118","https://openalex.org/W4237609564","https://openalex.org/W2004762911"],"abstract_inverted_index":{"JavaScript":[0,64,100,165],"is":[1,16],"the":[2,8,12,26,45,56,63,89,103,106,113,124,130,157,161,168],"main":[3],"language":[4,65],"used":[5,17],"to":[6,34,81,91,132,145,155,166],"provide":[7,22],"client-side":[9,104,131],"functionality":[10],"of":[11,47,62,105,126,164,170],"modern":[13,75],"web.":[14,107],"It":[15],"in":[18,74],"many":[19],"applications":[20,29,33,77],"that":[21,120],"high":[23],"interactivity":[24],"with":[25,70],"end-user.":[27],"These":[28],"range":[30],"from":[31],"mapping":[32],"online":[35],"games.":[36],"In":[37,108,153],"recent":[38],"years,":[39],"cyber-criminals":[40],"started":[41],"focusing":[42],"on":[43,102,129],"attacking":[44,55],"visitors":[46],"legitimate":[48],"websites":[49,57],"and":[50,66,97,122,149],"social":[51],"networks":[52],"rather":[53],"than":[54],"themselves.":[58],"The":[59,135],"dynamic":[60],"nature":[61],"its":[67,84,151],"tangled":[68],"usage":[69],"other":[71],"web":[72,76,174],"technologies":[73],"makes":[78],"it":[79],"hard":[80],"reason":[82],"about":[83],"code":[85,101],"statically.":[86],"This":[87],"poses":[88],"need":[90],"develop":[92],"effective":[93],"mechanisms":[94],"for":[95],"detecting":[96],"mitigating":[98],"malicious":[99],"this":[109],"paper,":[110],"we":[111,159],"address":[112],"above":[114],"challenges":[115],"by":[116],"developing":[117],"a":[118],"framework":[119],"detects":[121],"mitigates":[123],"flow":[125,140,172],"sensitive":[127,147],"information":[128,139,148,171],"illegal":[133],"channels.":[134],"proposed":[136],"model":[137],"uses":[138],"control":[141,169],"dynamically":[142],"at":[143],"run-time":[144],"track":[146],"prevents":[150],"leakage.":[152],"order":[154],"realize":[156],"model,":[158],"extend":[160],"operational":[162],"semantics":[163],"enable":[167],"inside":[173],"browsers.":[175]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
