{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:53Z","timestamp":1763468093224,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icse.2012.6227204","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T17:24:04Z","timestamp":1341854644000},"page":"80-90","source":"Crossref","is-referenced-by-count":18,"title":["Automatic input rectification"],"prefix":"10.1109","author":[{"given":"Fan","family":"Long","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Ganesh","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Carbin","sequence":"additional","affiliation":[]},{"given":"Stelios","family":"Sidiroglou","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"35","article-title":"A learning-based approach to the detection of sql attacks","author":"valeur","year":"2005","journal-title":"DIM 2005"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062499"},{"key":"36","article-title":"Anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"RAID"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368222"},{"key":"33","doi-asserted-by":"crossref","DOI":"10.1145\/1297027.1297072","article-title":"Living in the comfort zone","author":"rinard","year":"2007","journal-title":"Proceedings of the 22nd Annual ACMSIGPLAN Conference on Object-oriented Programming Systems and Applications OOPSLA '07"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2007.34","article-title":"Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing","author":"cui","year":"2007","journal-title":"Proc 2007 IEEE Symposium on Security and Privacy"},{"key":"34","article-title":"Using generalization and characterization techniques in the anomaly-based detection of web attacks","author":"robertson","year":"0","journal-title":"Proceedings of the 13 Th Symposium on Network and Distributed System Security (NDSS) 2006"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180412"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810333"},{"key":"20","article-title":"On gray-box program tracking for anomaly detection","volume":"13","author":"gao","year":"2004","journal-title":"Proceedings of the 13th conference on USENIX Security Symposium"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/948143.948144"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227204"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5494979"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"28","article-title":"Vulnerability-specific execution filtering for exploit prevention on commodity software","author":"newsome","year":"2006","journal-title":"NDSS"},{"key":"29","article-title":"Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software","author":"newsome","year":"0","journal-title":"Proceedings of the Network and Distributed Systems Security Symposium 2005"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","article-title":"Automating configuration troubleshooting with dynamic information flow analysis","author":"attariyan","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI'10"},{"year":"0","key":"1"},{"key":"30","article-title":"Behavioral clustering of http-based malware and signature generation using malicious network traces","author":"perdisci","year":"2010","journal-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"32","article-title":"The promise of Mechanical Turk: Howonline labor markets can help theorists run behavioral experiments","author":"rand","year":"2011","journal-title":"Journal of Theoretical Biology"},{"year":"0","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"journal-title":"Hachoir","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/12.2185"},{"journal-title":"VLC Media Player","year":"0","key":"8"}],"event":{"name":"2012 34th International Conference on Software Engineering (ICSE 2012)","start":{"date-parts":[[2012,6,2]]},"location":"Zurich","end":{"date-parts":[[2012,6,9]]}},"container-title":["2012 34th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6218989\/6227015\/06227204.pdf?arnumber=6227204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:08:03Z","timestamp":1497978483000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6227204\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icse.2012.6227204","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}