1. Lecture Notes in Computer Science;O Tripp,2013
2. Kapravelos, A., Grier, C., Chachra, N., Kruegel, C., Vigna, G., Paxson, V.: Hulk: eliciting malicious behavior in browser extensions. In: USENIX Security, pp. 641–654, August 2014
3. Dhawan, M., Ganapathy, V.: Analyzing information flow in JavaScript-based browser extensions. In: Computer Security Applications Conference, ACSAC 2009 Annual, pp. 382–391. IEEE, December 2009
4. Carlini, N., Felt, A.P., Wagner, D.: An evaluation of the Google Chrome extension security architecture. In: USENIX Security Symposium, pp. 97–111, 8 August 2012
5. http://wala.sourceforge.net/wiki/index.php/UserGuide:CallGraph