{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:02:42Z","timestamp":1766466162819,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/wse.2007.4380243","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T16:53:10Z","timestamp":1194972790000},"page":"45-49","source":"Crossref","is-referenced-by-count":4,"title":["SQL-Injection Security Evolution Analysis in PHP"],"prefix":"10.1109","author":[{"given":"Ettore","family":"Merlo","sequence":"first","affiliation":[]},{"given":"Dominic","family":"Letarte","sequence":"additional","affiliation":[]},{"given":"Giuliano","family":"Antoniol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/spe.374"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2004.1334766"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00123-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738509"},{"key":"ref14","first-page":"236","volume":"19","author":"denning","year":"1976","journal-title":"A lattice model of"},{"key":"ref15","first-page":"160","article-title":"Softwareevolution observations based on product release history","author":"gall","year":"1997","journal-title":"Proceedings of IEEE International Conference on Software Maintenance"},{"key":"ref16","first-page":"87","article-title":"Information flow control for java based on path conditions in dependence graphs","author":"hammer","year":"2006","journal-title":"Interational Symposium on Secure Software Engineering (ISSSE)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.1996.558900"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891463"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"journal-title":"PHP","year":"0","key":"ref4"},{"journal-title":"MySql","year":"0","key":"ref3"},{"journal-title":"phpBB archive","year":"0","key":"ref6"},{"journal-title":"Phpbb","year":"0","key":"ref5"},{"journal-title":"XPath","year":"0","key":"ref8"},{"journal-title":"phpBB security","year":"0","key":"ref7"},{"journal-title":"PHP grammar","year":"0","key":"ref2"},{"key":"ref9","article-title":"Advanced SQL injection","author":"anley","year":"2002","journal-title":"Technical Report"},{"journal-title":"Javacc","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11805"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792597"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738510"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.33"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/ICSM.2004.1357826","article-title":"Linear complexity object-oriented similarity for clone detection and software evolution analysis","author":"merlo","year":"2004","journal-title":"Proceedings of IEEE International Conference on Software Maintenance"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","article-title":"A sound type system for secure flow analysis","volume":"4","author":"volpano","year":"1996","journal-title":"Journal of Computer Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2007.16"}],"event":{"name":"Ninth IEEE International Symposium on Web Site Evolution","start":{"date-parts":[[2007,10,5]]},"location":"Paris","end":{"date-parts":[[2007,10,6]]}},"container-title":["2007 9th IEEE International Workshop on Web Site Evolution"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4380228\/4380229\/04380243.pdf?arnumber=4380243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T19:49:08Z","timestamp":1580759348000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4380243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wse.2007.4380243","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}