{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:36Z","timestamp":1750306296665,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2889263","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"859-862","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Reusing stack traces"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Theisen","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, North Carolina"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"109","volume":"03","author":"Howard M.","year":"2005","journal-title":"\"Measuring Relative Attack Surfaces,\" Comput. Secur. 21st Century, no. CMUTR-"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.78"},{"volume-title":"Florence, Italy","year":"2015","author":"Theisen C.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"C. Theisen R. Krishna and L. Williams \"Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces \" in North Carolina State University Department of Computer Science TR2015-10 submitted to International Conference on Software Testing Verification and Validation (ICST) 2016 2015.  C. Theisen R. Krishna and L. Williams \"Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces \" in North Carolina State University Department of Computer Science TR2015-10 submitted to International Conference on Software Testing Verification and Validation (ICST) 2016 2015."},{"volume-title":"OWASP Attack Surface Analysis Cheat Sheet","year":"2015","author":"Bird J.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"e_1_3_2_1_7_1","first-page":"305","author":"Heumann T.","year":"2010","journal-title":"\"Quantifying the Attack Surface of a Web Application,\" in GI SICHERHIET"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_2_1_9_1","first-page":"1084","volume-title":"Switzerland","author":"Dang Y.","year":"2012"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483763"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179494.1179497"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.32"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA458115"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2807563"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889263","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2889263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889263"}},"subtitle":["automated attack surface approximation"],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":14,"alternative-id":["10.1145\/2889160.2889263","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2889263","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}