{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:34:23Z","timestamp":1769729663822,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319263618","type":"print"},{"value":"9783319263625","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_14","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"295-316","source":"Crossref","is-referenced-by-count":28,"title":["j\u00c4k: Using Dynamic Analysis to Crawl and Test Modern Web Applications"],"prefix":"10.1007","author":[{"given":"Giancarlo","family":"Pellegrino","sequence":"first","affiliation":[]},{"given":"Constantin","family":"Tsch\u00fcrtz","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Zhou, J., Ding, Y.: An analysis of URLs generated from javascript code. In: 2012 IEEE\/ACIS 11th International Conference on Computer and Information Science (ICIS), vol. 5, pp. 688\u2013693 (2012)","DOI":"10.1109\/ICIS.2012.28"},{"issue":"1","key":"14_CR2","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2109205.2109208","volume":"6","author":"A Mesbah","year":"2012","unstructured":"Mesbah, A., van Deursen, A., Lenselink, S.: Crawling ajax-based web applications through dynamic analysis of user interface state changes. ACM Trans. Web 6(1), 3:1\u20133:30 (2012)","journal-title":"ACM Trans. Web"},{"key":"14_CR3","unstructured":"Urgun, B.: Web Input Vector Extractor Teaser (2015). https:\/\/github.com\/bedirhan\/wivet"},{"key":"14_CR4","unstructured":"Hickson, I.: A vocabulary and associated APIs for HTML and XHTML (2014). http:\/\/dev.w3.org\/html5\/workers\/"},{"key":"14_CR5","unstructured":"van Kesteren, A., Gregor, A., Ms2ger, Russell, A., Berjon, R.: W3C DOM4 (2015). http:\/\/www.w3.org\/TR\/dom\/"},{"key":"14_CR6","unstructured":"The Python Software Foundation: Python (2015). https:\/\/www.python.org\/"},{"key":"14_CR7","unstructured":"Apple Inc.: The WebKit Open Source Project (2015). https:\/\/www.webkit.org\/"},{"key":"14_CR8","unstructured":"Riverbank Computing Limited: PyQt - The GPL Licensed Python Bindings for the Qt Application Framework (2015). http:\/\/pyqt.sourceforge.net\/"},{"key":"14_CR9","unstructured":"Google Inc.: V8 JavaScript Engine (2015). https:\/\/code.google.com\/p\/v8\/"},{"key":"14_CR10","unstructured":"Mozilla Foundation: SpiderMonkey (2015). https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey"},{"key":"14_CR11","unstructured":"Zalewski, M.: Skipfish (2015). https:\/\/code.google.com\/p\/skipfish\/"},{"key":"14_CR12","unstructured":"Riancho, A.: w3af: Web Application Attack and Audit Framework (2015). http:\/\/w3af.org\/"},{"key":"14_CR13","unstructured":"Nik\u0161i\u0107, H., Scrivano, G.: GNU Wget (2015). http:\/\/www.gnu.org\/software\/wget\/"},{"key":"14_CR14","unstructured":"Doup\u00e9, A., Cavedon, L., Kruegel, C., Vigna, G.: Enemy of the state: a state-aware black-box vulnerability scanner. In: Proceedings of the 2012 USENIX Security Symposium (USENIX 2012), Bellevue, WA (2012)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Bau, J., Bursztein, E., Gupta, D., Mitchell, J.: State of the art: automated black-box web application vulnerability testing. In: 2010 IEEE Symposium on Security and Privacy (SP) (2010)","DOI":"10.1109\/SP.2010.27"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-14215-4_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A Doup\u00e9","year":"2010","unstructured":"Doup\u00e9, A., Cova, M., Vigna, G.: Why Johnny can\u2019t pentest: an analysis of black-box web vulnerability scanners. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 111\u2013131. Springer, Heidelberg (2010)"},{"key":"14_CR17","unstructured":"Guangdong, B., Guozhu, M., Jike, L., Sai, S.V., Prateek, S., Jun, S., Yang, L., Jinsong, D.: Authscan: Automatic extraction of web authentication protocols from implementations. In: 2013 Annual Network and Distributed System Security Symposium (NDSS). The Internet Society (2013)"},{"key":"14_CR18","unstructured":"Zhou, Y., Evans, D.: Ssoscan: automated testing of web applications for single sign-on vulnerabilities. In: 23rd USENIX Security Symposium (USENIX Security 2014), pp. 495\u2013510. USENIX Association, San Diego, CA (2014)"},{"key":"14_CR19","unstructured":"Artzi, S., Dolby, J., Jensen, S.H., M\u00f8ller, A., Tip, F.: A framework for automated testing of javascript web applications. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 571\u2013580. ACM, New York, NY, USA (2011). http:\/\/doi.acm.org\/10.1145\/1985793.1985871"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:26:01Z","timestamp":1748665561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}