{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:54:23Z","timestamp":1755838463491,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/K008129\/1"],"award-info":[{"award-number":["EP\/K008129\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813639","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"603-615","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["FlowWatcher"],"prefix":"10.1145","author":[{"given":"Divya","family":"Muthukumaran","sequence":"first","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Dan","family":"O'Keeffe","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"Christian","family":"Priebe","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]},{"given":"David","family":"Eyers","sequence":"additional","affiliation":[{"name":"University of Otago, Dunedin, New Zealand"}]},{"given":"Brian","family":"Shand","sequence":"additional","affiliation":[{"name":"NCRS, Public Health England, Cambridge, United Kingdom"}]},{"given":"Peter","family":"Pietzuch","sequence":"additional","affiliation":[{"name":"Imperial College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"volume-title":"jmeter.apache.org","year":"2014","author":"Meter Apache","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315250"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866375"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046774"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.16"},{"volume-title":"USENIX WebApps","year":"2011","author":"Burket J.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1776434.1776440"},{"volume-title":"cve.mitre.org","year":"2014","author":"CVE.","key":"e_1_3_2_1_9_1"},{"volume-title":"USENIX Security","year":"2009","author":"Dalton M.","key":"e_1_3_2_1_10_1"},{"volume-title":"The Ponder Policy Spec. Language. In Workshop on Policies for Distributed Systems and Networks (POLICY)","year":"2001","author":"Damianou N.","key":"e_1_3_2_1_11_1"},{"volume-title":"www.dokuwiki.org","year":"2014","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046736"},{"volume-title":"www.dropbox.com","year":"2015","key":"e_1_3_2_1_14_1"},{"volume-title":"Web vulnerability affecting shared links. bit.ly\/1FiRIsv","year":"2014","author":"Blog The Dropbox","key":"e_1_3_2_1_15_1"},{"volume-title":"www.drupal.org","year":"2014","key":"e_1_3_2_1_16_1"},{"volume-title":"www.drupal.org\/project\/nodeaccesskeys","year":"2014","author":"Access Keys Drupal Node","key":"e_1_3_2_1_17_1"},{"volume-title":"www.drupal.org\/project\/og","year":"2014","author":"Drupal Organic Groups Module.","key":"e_1_3_2_1_18_1"},{"volume-title":"www.drupal.org\/security\/contrib","year":"2014","author":"Advisories Drupal Security","key":"e_1_3_2_1_19_1"},{"volume-title":"www.evernote.com","year":"2014","key":"e_1_3_2_1_20_1"},{"volume-title":"USENIX Security","year":"2010","author":"Felmetsger V.","key":"e_1_3_2_1_21_1"},{"volume-title":"OSDI","year":"2012","author":"Giffin D. B.","key":"e_1_3_2_1_22_1"},{"volume-title":"about.gitlab.com","year":"2014","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.09.016"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774480"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328408.1328410"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076767"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133605"},{"volume-title":"www.modsecurity.org","year":"2014","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660337"},{"volume-title":"HotCloud","year":"2011","author":"Mundada Y.","key":"e_1_3_2_1_33_1"},{"volume-title":"Russian Hackers Amass Over a Billion Internet Passwords. nyti.ms\/1mjPhsL","year":"2014","author":"Times New York","key":"e_1_3_2_1_34_1"},{"volume-title":"www.nginx.org","year":"2014","key":"e_1_3_2_1_35_1"},{"volume-title":"bit.ly\/1BRwfFt","year":"2013","author":"Xtensible Access Control Markup OASIS","key":"e_1_3_2_1_36_1"},{"volume-title":"Injection flaws. www.owasp.org\/index.php\/Top_10_2013-A1-Injection","year":"2013","author":"App Open Web","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","first-page":"10","author":"Application Security Open Web","year":"2013","journal-title":"OWASP Top"},{"volume-title":"SQL Injection Prevention Cheat Sheet. www.owasp.org\/index.php\/SQL_Injection_Prevention_Cheat_Sheet","year":"2014","author":"Application Security Open Web","key":"e_1_3_2_1_39_1"},{"volume-title":"www.owncloud.org","year":"2014","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_21"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23021"},{"volume-title":"www.phpbb.com","year":"2014","author":"BB.","key":"e_1_3_2_1_43_1"},{"volume-title":"www.phpmyadmin.net","year":"2014","key":"e_1_3_2_1_44_1"},{"volume-title":"www.redis.io","year":"2014","key":"e_1_3_2_1_45_1"},{"volume-title":"Linux Journal","year":"2008","author":"Reese W.","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"volume-title":"NDSS","year":"2009","author":"Sekar R.","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048146"},{"volume-title":"NDSS","year":"2013","author":"Son S.","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368112"},{"volume-title":"Website security statistics report. www.whitehatsec.com\/resource\/stats.html","year":"2014","author":"Security WhiteHat","key":"e_1_3_2_1_53_1"},{"volume-title":"www.wordpress.com","year":"2014","key":"e_1_3_2_1_54_1"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:36Z","timestamp":1750225716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813639"}},"subtitle":["Defending against Data Disclosure Vulnerabilities in Web Applications"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":55,"alternative-id":["10.1145\/2810103.2813639","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813639","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}