{"id":"https://openalex.org/W3044475393","doi":"https://doi.org/10.1109/tdsc.2020.3009472","title":"JSCSP: a Novel Policy-Based XSS Defense Mechanism for Browsers","display_name":"JSCSP: a Novel Policy-Based XSS Defense Mechanism for Browsers","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3044475393","doi":"https://doi.org/10.1109/tdsc.2020.3009472","mag":"3044475393"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2020.3009472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3009472","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8086&context=sis_research","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040791046","display_name":"Guangquan Xu","orcid":"https://orcid.org/0000-0001-8701-3944"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangquan Xu","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","[College of Intelligence and Computing, Tianjin University, Tianjin, Tianjin China (e-mail: losin@tju.edu.cn)]"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"[College of Intelligence and Computing, Tianjin University, Tianjin, Tianjin China (e-mail: losin@tju.edu.cn)]","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084396416","display_name":"Xiaofei Xie","orcid":"https://orcid.org/0000-0002-1288-6502"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofei Xie","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","[College of Intelligence and Computing, Tianjin University, Tianjin, Tianjin China (e-mail: xiexiaofei@tju.edu.cn)]"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"[College of Intelligence and Computing, Tianjin University, Tianjin, Tianjin China (e-mail: xiexiaofei@tju.edu.cn)]","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003699091","display_name":"Shuhan Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuhan Huang","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","[College of Intelligence and Computing, Tianjin University, Tianjin, Tianjin China (e-mail: 541395961@qq.com)]"],"affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]},{"raw_affiliation_string":"[College of Intelligence and Computing, Tianjin University, Tianjin, Tianjin China (e-mail: 541395961@qq.com)]","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400217","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0001-7835-9871"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia","School of Software & Electrical Engineering, Swinburne University of Technology, 3783 Hawthorn, Victoria Australia (e-mail: junzhang@swin.edu.au)"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"School of Software & Electrical Engineering, Swinburne University of Technology, 3783 Hawthorn, Victoria Australia (e-mail: junzhang@swin.edu.au)","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045991464","display_name":"Lei Pan","orcid":"https://orcid.org/0000-0002-4691-8330"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lei Pan","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, VIC, Australia","School of IT, Deakin University, Burwood, Victoria Australia 3125 (e-mail: l.pan@deakin.edu.au)"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of IT, Deakin University, Burwood, Victoria Australia 3125 (e-mail: l.pan@deakin.edu.au)","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087959421","display_name":"Wei Lou","orcid":"https://orcid.org/0000-0002-9784-5741"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wei Lou","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","[Department of Computing, Hong Kong Polytechnic University, Hong Kog, Hong Kong Hong Kong 000000 (e-mail: csweilou@comp.polyu.edu.hk)]"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"[Department of Computing, Hong Kong Polytechnic University, Hong Kog, Hong Kong Hong Kong 000000 (e-mail: csweilou@comp.polyu.edu.hk)]","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001485404","display_name":"Kaitai Liang","orcid":"https://orcid.org/0000-0003-0262-7678"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Kaitai Liang","raw_affiliation_strings":["Delft University of Technology, Delft, CD, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Delft University of Technology, Delft, CD, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5040791046"],"corresponding_institution_ids":["https://openalex.org/I162868743"],"apc_list":null,"apc_paid":null,"fwci":3.0598,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.92989165,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.953559935092926},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8641091585159302},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.7973117232322693},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.7391448616981506},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6670315861701965},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5702401995658875},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.48614832758903503},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4811593294143677},{"id":"https://openalex.org/keywords/backward-compatibility","display_name":"Backward compatibility","score":0.4786226153373718},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4633508324623108},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.45248016715049744},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.42984020709991455},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4011985659599304},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.31791287660598755},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24725133180618286},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.12145647406578064}],"concepts":[{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.953559935092926},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8641091585159302},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.7973117232322693},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.7391448616981506},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6670315861701965},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5702401995658875},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.48614832758903503},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4811593294143677},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.4786226153373718},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4633508324623108},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.45248016715049744},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.42984020709991455},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4011985659599304},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.31791287660598755},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24725133180618286},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.12145647406578064}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tdsc.2020.3009472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2020.3009472","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8086","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8086&context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30140326","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20698030","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/JSCSP_a_novel_policy-based_XSS_defense_mechanism_for_browsers/20698030","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-8086","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=8086&context=sis_research","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G605921640","display_name":null,"funder_award_id":"U1736115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7106518219","display_name":null,"funder_award_id":"UAH6","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"},{"id":"https://openalex.org/G7544680884","display_name":null,"funder_award_id":"BCB6","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"},{"id":"https://openalex.org/G8006570727","display_name":null,"funder_award_id":"YBJU","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"},{"id":"https://openalex.org/G8933036570","display_name":null,"funder_award_id":"UAJH","funder_id":"https://openalex.org/F4320322598","funder_display_name":"Hong Kong Polytechnic University"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322598","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1974977720","https://openalex.org/W1984462474","https://openalex.org/W1990421186","https://openalex.org/W1991074244","https://openalex.org/W1997401315","https://openalex.org/W2002447170","https://openalex.org/W2056511696","https://openalex.org/W2057718232","https://openalex.org/W2060218972","https://openalex.org/W2085925880","https://openalex.org/W2114486350","https://openalex.org/W2124406434","https://openalex.org/W2148009765","https://openalex.org/W2168563136","https://openalex.org/W2290753859","https://openalex.org/W2293544841","https://openalex.org/W2344670370","https://openalex.org/W2499563327","https://openalex.org/W2510134782","https://openalex.org/W2535549398","https://openalex.org/W2536013516","https://openalex.org/W2575436837","https://openalex.org/W2577844960","https://openalex.org/W2591642604","https://openalex.org/W2765755114","https://openalex.org/W2766183686","https://openalex.org/W2767629333","https://openalex.org/W2790664081","https://openalex.org/W2796200341","https://openalex.org/W2905097561","https://openalex.org/W4234870697","https://openalex.org/W6713329725"],"related_works":["https://openalex.org/W2907490423","https://openalex.org/W2548409577","https://openalex.org/W2407701912","https://openalex.org/W3180404666","https://openalex.org/W1531015913","https://openalex.org/W1484631816","https://openalex.org/W2167752994","https://openalex.org/W2907218437","https://openalex.org/W2117221897","https://openalex.org/W2181766705"],"abstract_inverted_index":{"To":[0,57],"mitigate":[1],"cross-site":[2],"scripting":[3],"attacks":[4],"(XSS),":[5],"the":[6,48,59,120,137,155,170,176],"W3C":[7],"group":[8],"recommends":[9],"web":[10,178],"service":[11],"providers":[12],"to":[13,37,75,83,100,117,188],"employ":[14],"a":[15,91,127,147],"computer":[16],"security":[17,85,94],"standard":[18],"called":[19],"Content":[20],"Security":[21],"Policy":[22],"(CSP).":[23],"However,":[24],"less":[25],"than":[26,136],"3.7":[27],"percent":[28],"of":[29,43,50,61,78],"real-world":[30,79],"websites":[31],"are":[32],"equipped":[33],"with":[34,159],"CSP":[35,44,70],"according":[36],"Google\u2019s":[38],"survey.":[39],"The":[40],"low":[41],"scalability":[42,60],"is":[45,73,131,157],"incurred":[46],"by":[47,140],"difficulty":[49],"deployment":[51],"and":[52,108,123,134,150,168],"non-compatibility":[53],"for":[54],"state-of-art":[55],"browsers.":[56],"explore":[58],"CSP,":[62],"in":[63,126],"this":[64],"article,":[65],"we":[66],"propose":[67],"JavaScript":[68,104,161],"based":[69],"(JSCSP),":[71],"which":[72,96,130],"able":[74],"support":[76],"most":[77],"browsers":[80],"but":[81],"also":[82],"generate":[84,119],"policies":[86],"automatically.":[87],"Specifically,":[88],"JSCSP":[89,112,145,164,183],"offers":[90],"novel":[92],"self-defined":[93],"policy":[95,121],"enforces":[97],"essential":[98],"confinements":[99],"related":[101],"items,":[102],"including":[103],"functions,":[105],"DOM":[106],"elements":[107],"data":[109],"access.":[110],"Meanwhile,":[111],"has":[113],"an":[114],"efficient":[115],"algorithm":[116],"automatically":[118],"directives":[122],"enforce":[124],"them":[125],"cascading":[128],"way,":[129],"more":[132],"fine-grained":[133],"practical":[135],"functionalities":[138],"provided":[139],"CSP.":[141],"We":[142,180],"further":[143],"implement":[144],"on":[146],"Chrome":[148],"extension,":[149],"our":[151],"evaluation":[152],"shows":[153],"that":[154,182],"extension":[156,165],"compatible":[158],"popular":[160],"libraries.":[162],"Our":[163],"can":[166],"detect":[167],"block":[169],"tested":[171],"attacking":[172],"vectors":[173],"extracted":[174],"from":[175],"prevalent":[177],"applications.":[179],"state":[181],"delivers":[184],"better":[185],"performance":[186],"compared":[187],"other":[189],"XSS":[190],"defense":[191],"solutions.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
