{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:52Z","timestamp":1750306732382,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T00:00:00Z","timestamp":1404172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,7]]},"abstract":"<jats:p>If you see something, say something.<\/jats:p>","DOI":"10.1145\/2622630","type":"journal-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T14:23:02Z","timestamp":1404224582000},"page":"58-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Finding more than one worm in the apple"],"prefix":"10.1145","volume":"57","author":[{"given":"Mike","family":"Bland","sequence":"first","affiliation":[{"name":"Google"}]}],"member":"320","published-online":{"date-parts":[[2014,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Apple Inc. Xcode overview 2014; http:\/\/bit.ly\/1kXUAzD  Apple Inc. Xcode overview 2014; http:\/\/bit.ly\/1kXUAzD"},{"volume-title":"The Guardian, (Feb. 25, 2014","year":"2014","author":"Arthur C.","key":"e_1_2_1_2_1"},{"volume-title":"Slate (Feb. 25","year":"2014","author":"Auerbach D.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","unstructured":"Bellovin S.M. Goto Fail. SMBlog (Feb. 23 2014); https:\/\/www.cs.columbia.edu\/~smb\/blog\/2014-02\/2014-02-23.html.  Bellovin S.M. Goto Fail. SMBlog (Feb. 23 2014); https:\/\/www.cs.columbia.edu\/~smb\/blog\/2014-02\/2014-02-23.html."},{"key":"e_1_2_1_5_1","unstructured":"Bland M. Test Certified 2011; http:\/\/mike-bland.com\/2011\/10\/18\/test-certified.html.  Bland M. Test Certified 2011; http:\/\/mike-bland.com\/2011\/10\/18\/test-certified.html."},{"key":"e_1_2_1_6_1","unstructured":"Bland M. Testing on the Toilet 2011; http:\/\/mike-bland.com\/2011\/10\/25\/testing-on-the-toilet.html.  Bland M. Testing on the Toilet 2011; http:\/\/mike-bland.com\/2011\/10\/25\/testing-on-the-toilet.html."},{"key":"e_1_2_1_7_1","unstructured":"Bland M. Test Mercenaries 2012; http:\/\/mike-bland.com\/2012\/07\/10\/test-mercenaries.html.  Bland M. Test Mercenaries 2012; http:\/\/mike-bland.com\/2012\/07\/10\/test-mercenaries.html."},{"key":"e_1_2_1_8_1","unstructured":"Bland M. AutoTest Central 2014; http:\/\/autotestcentral.com\/small-medium-and-large-test-sizes  Bland M. AutoTest Central 2014; http:\/\/autotestcentral.com\/small-medium-and-large-test-sizes"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/362929.362947"},{"key":"e_1_2_1_10_1","unstructured":"Fuller L. TestableSecurity: demonstrating that &lt;code&gt;SSLVerifySignedServerKeyExchange()&lt;\/code&gt; is trivially testable 2014; https:\/\/github.com\/landonf\/Testability-CVE-2014-1266.  Fuller L. TestableSecurity: demonstrating that &lt;code&gt;SSLVerifySignedServerKeyExchange()&lt;\/code&gt; is trivially testable 2014; https:\/\/github.com\/landonf\/Testability-CVE-2014-1266."},{"volume-title":"Google Testing Blog (Feb. 21, 2008","year":"2008","author":"Google Inc","key":"e_1_2_1_11_1"},{"volume-title":"The Wire (July 30, 2012","year":"2012","author":"Greenfield R. Why Apple's","key":"e_1_2_1_12_1"},{"key":"e_1_2_1_13_1","unstructured":"Langley A. Apple's SSL\/TLS bug. Imperial Violet (Feb. 22 2014); https:\/\/www.imperialviolet.org\/2014\/02\/22\/applebug.html.  Langley A. Apple's SSL\/TLS bug. Imperial Violet (Feb. 22 2014); https:\/\/www.imperialviolet.org\/2014\/02\/22\/applebug.html."},{"volume-title":"Exploring Agile Solutions: Software Development with Agile Practices (Feb. 23, 2014","year":"2014","author":"Ray C.K.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","unstructured":"Schneier B. Was the iOS SSL flaw deliberate? Schneier on Security: A Blog Covering Security and Security Technology (Feb. 2014); https:\/\/www.schneier.com\/blog\/archives\/2014\/02\/was_the_ios_ssl.html.  Schneier B. Was the iOS SSL flaw deliberate? Schneier on Security: A Blog Covering Security and Security Technology (Feb. 2014); https:\/\/www.schneier.com\/blog\/archives\/2014\/02\/was_the_ios_ssl.html."},{"key":"e_1_2_1_16_1","unstructured":"van Deursen A. Learning from Apple's #gotofail security bug. Arie van Deursen: Software Engineering in Theory and Practice (Feb. 22 2014); http:\/\/avandeursen.com\/2014\/02\/22\/gotofail-security\/.  van Deursen A. Learning from Apple's #gotofail security bug. Arie van Deursen: Software Engineering in Theory and Practice (Feb. 22 2014); http:\/\/avandeursen.com\/2014\/02\/22\/gotofail-security\/."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2622630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2622630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:45Z","timestamp":1750231185000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2622630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":16,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["10.1145\/2622630"],"URL":"https:\/\/doi.org\/10.1145\/2622630","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2014,7]]},"assertion":[{"value":"2014-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}