{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:28:01Z","timestamp":1770845281523,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343625","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"3102-3107","source":"Crossref","is-referenced-by-count":0,"title":["JAuthGuard: Automatic Detection for Broken Access Control in Java Web APIs"],"prefix":"10.1109","author":[{"given":"Ruizhi","family":"Feng","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Mengjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Ang","family":"Xia","sequence":"additional","affiliation":[{"name":"State Grid Information &amp; Telecommunication Co.,Ltd.,Beijing,China"}]},{"given":"Jie","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Grid Information &amp; Telecommunication Co.,Ltd.,Beijing,China"}]},{"given":"Yunpeng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Yuling","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3551393"},{"key":"ref2","first-page":"950","article-title":"Cwe-723: Owasp top ten 2004 category a2-broken access control","volume":"711","author":"Nature Type","year":"2011","journal-title":"CWE Version 2.1"},{"key":"ref3","article-title":"Owasp top10"},{"key":"ref4","article-title":"Quantitative assessment on broken access control vulnerability in web applications","volume-title":"International Conference on Cyber Security and Computer Science 2018","author":"Hassan"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.39"},{"key":"ref6","article-title":"Static detection of access control vulnerabilities in web applications","volume-title":"20th USENIX Security Symposium (USENIX Security 11)","author":"Sun"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660337"},{"key":"ref8","first-page":"155","article-title":"Finding access control bugs in web applications with cancheck","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering","author":"Boci\u0107"},{"key":"ref9","article-title":"Ruby on rails"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560589"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58291.2024.00054"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54997-8_34"},{"key":"ref13","article-title":"Spring"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/1990888"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"ref17","article-title":"Jimple: Simplifying java bytecode for analyses and transformations.(1998)","author":"Vallee-Rai","year":"1998"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234183"},{"key":"ref19","article-title":"Fortify sca"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343625.pdf?arnumber=11343625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:50:22Z","timestamp":1770843022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343625","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}