{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:06Z","timestamp":1763468046381,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046774","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"575-586","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["WAPTEC"],"prefix":"10.1145","author":[{"given":"Prithvi","family":"Bisht","sequence":"first","affiliation":[{"name":"University of Illinois Chicago, Chicago, IL, USA"}]},{"given":"Timothy","family":"Hinrichs","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Nazari","family":"Skrupsky","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, IL, USA"}]},{"given":"V. N.","family":"Venkatakrishnan","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Google Web Toolkit. http:\/\/www.google.com\/webtoolkit\/.  Google Web Toolkit. http:\/\/www.google.com\/webtoolkit\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Ruby on Rails. http:\/\/www.rubyonrails.org\/.  Ruby on Rails. http:\/\/www.rubyonrails.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"18th Annual Network and Distributed System Security Symposium","author":"Balduzzi M.","year":"2011","unstructured":"Balduzzi , M. , Gimenez , C. T. , Balzarotti , D. , and Kirda , E . Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications . In 18th Annual Network and Distributed System Security Symposium ( San Diego, CA, USA , 2011 ). Balduzzi, M., Gimenez, C. T., Balzarotti, D., and Kirda, E. Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications . In 18th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2011)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.22"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315250"},{"key":"e_1_3_2_1_6_1","volume-title":"Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium","author":"Bethea D.","year":"2010","unstructured":"Bethea , D. , Cochran , R. , and Reiter , M . Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium ( San Diego, CA, USA , 2010 ). Bethea, D., Cochran, R., and Reiter, M. Server-side Verification of Client Behavior in Online Games. In NDSS'10: Proceedings of the 17th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2010)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866375"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294265"},{"key":"e_1_3_2_1_9_1","volume-title":"FMCO","author":"Cooper E.","year":"2006","unstructured":"Cooper , E. , Lindley , S. , Wadler , P. , and Yallop , J . Links: Web programming without tiers . In FMCO ( 2006 ). Cooper, E., Lindley, S., Wadler, P., and Yallop, J. Links: Web programming without tiers. In FMCO (2006)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559875"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273484"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_13_1","volume-title":"Toward Automated Detection of Logic Vulnerabilities in Web Applications. In 19th USENIX Security Symposium","author":"Felmetsger V.","year":"2010","unstructured":"Felmetsger , V. , Cavedon , L. , Kruegel , C. , and Vigna , G . Toward Automated Detection of Logic Vulnerabilities in Web Applications. In 19th USENIX Security Symposium ( Washington, DC, USA , 2010 ). Felmetsger, V., Cavedon, L., Kruegel, C., and Vigna, G. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In 19th USENIX Security Symposium (Washington, DC, USA, 2010)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_15_1","volume-title":"Automated Whitebox Fuzz Testing. In NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium","author":"Godefroid P.","year":"2008","unstructured":"Godefroid , P. , Levin , M. Y. , and Molnar , D. A . Automated Whitebox Fuzz Testing. In NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium ( San Diego, CA, USA , 2008 ). Godefroid, P., Levin, M. Y., and Molnar, D. A. Automated Whitebox Fuzz Testing. In NDSS'08: Proceedings of the 15th Annual Network and Distributed System Security Symposium (San Diego, CA, USA, 2008)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572305"},{"key":"e_1_3_2_1_17_1","volume-title":"Fast and Precise Sanitizer Analysis with BEK. In 20th USENIX Security Symposium","author":"Hooimeijer P.","year":"2011","unstructured":"Hooimeijer , P. , Livhsits , B. , Molnar , D. , Saxena , P. , and Veanes , M . Fast and Precise Sanitizer Analysis with BEK. In 20th USENIX Security Symposium ( San Francisco, CA, USA , 2011 ). Hooimeijer, P., Livhsits, B., Molnar, D., Saxena, P., and Veanes, M. Fast and Precise Sanitizer Analysis with BEK. In 20th USENIX Security Symposium (San Francisco, CA, USA, 2011)."},{"key":"e_1_3_2_1_18_1","volume-title":"Enforcing Request Integrity in Web Applications. In DBSec'10: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy","author":"Jayaraman K.","year":"2010","unstructured":"Jayaraman , K. , Lewandowski , G. , Talaga , P. G. , and Chapin , S. J . Enforcing Request Integrity in Web Applications. In DBSec'10: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy ( Rome, Italy , 2010 ). Jayaraman, K., Lewandowski, G., Talaga, P. G., and Chapin, S. J. Enforcing Request Integrity in Web Applications. In DBSec'10: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (Rome, Italy, 2010)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.38"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993539"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111070"},{"key":"e_1_3_2_1_25_1","volume-title":"AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In 17th USENIX Security Symposium","author":"Tan L.","year":"2008","unstructured":"Tan , L. , Zhang , X. , Ma , X. , Xiong , W. , and Zhou , Y . AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In 17th USENIX Security Symposium ( San Jose, CA, USA , 2008 ). Tan, L., Zhang, X., Ma, X., Xiong, W., and Zhou, Y. AutoISES: Automatically Inferring Security Specifications and Detecting Violations. In 17th USENIX Security Symposium (San Jose, CA, USA, 2008)."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046774"}},"subtitle":["whitebox analysis of web applications for parameter tampering exploit construction"],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":25,"alternative-id":["10.1145\/2046707.2046774","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046774","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}