1. Chrome extension developers under a barrage of phishing attacks. https://tech.slashdot.org/story/17/08/11/221203/chrome-extensiondevelopers-under-a-barrage-of-phishing-attacks (2017)
2. Google removes chrome extension used in banking fraud (2017), https://threatpost.com/google-removes-chrome-extension-used-in-bankingfraud/127469/
3. Malicious chrome extensions steal passwords & cpu power. https://duo.com/ decipher/malicious-chrome-extensions-steal-passwords-and-cpu (2017)
4. Arzt, S., Bodden, E.: Reviser: Efficiently updating ide-/ifds-based data-flow analyses in response to incremental program changes. In: ICSE 2014. pp. 288–298 (2014)
5. Bellon, S., Koschke, R., Antoniol, G., Krinke, J., Merlo, E.: Comparison and evaluation of clone detection tools. IEEE Transactions on software engineering 33(9) (2007)