A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy | IEEE Conference Publication | IEEE Xplore