{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:22:09Z","timestamp":1774369329880,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,18]],"date-time":"2016-07-18T00:00:00Z","timestamp":1468800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UID\/CEC\/50021\/2013 (INESC-ID),UID\/CEC\/00408\/2013 (LaSIGE)"],"award-info":[{"award-number":["UID\/CEC\/50021\/2013 (INESC-ID),UID\/CEC\/00408\/2013 (LaSIGE)"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004966","name":"European Commission","doi-asserted-by":"publisher","award":["FP7-607109 (SEGRID)"],"award-info":[{"award-number":["FP7-607109 (SEGRID)"]}],"id":[{"id":"10.13039\/501100004966","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,18]]},"DOI":"10.1145\/2931037.2931041","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T12:33:29Z","timestamp":1467894809000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["DEKANT: a static analysis tool that learns to detect web application vulnerabilities"],"prefix":"10.1145","author":[{"given":"Ib\u00e9ria","family":"Medeiros","sequence":"first","affiliation":[{"name":"University of Lisbon, Portugal \/ INESC-ID, Portugal"}]},{"given":"Nuno","family":"Neves","sequence":"additional","affiliation":[{"name":"University of Lisbon, Portugal \/ LaSIGE, Portugal"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"University of Lisbon, Portugal \/ INESC-ID, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2016,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Millions of websites hit by Drupal hack attack (Oct","author":"Technology","year":"2014","unstructured":"BBC Technology : Millions of websites hit by Drupal hack attack (Oct 2014 ), http:\/\/www.bbc.com\/news\/technology-29846539 BBC Technology: Millions of websites hit by Drupal hack attack (Oct 2014), http:\/\/www.bbc.com\/news\/technology-29846539"},{"key":"e_1_3_2_1_2_1","unstructured":"CVE\n  : http:\/\/cve.mitre.org  CVE: http:\/\/cve.mitre.org"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 21st Network and Distributed System Security Symposium (Feb 2014)","author":"Dahse J.","unstructured":"Dahse , J. , Holz , T. : Simulation of built-in PHP features for precise static code analysis . In: Proceedings of the 21st Network and Distributed System Security Symposium (Feb 2014) Dahse, J., Holz, T.: Simulation of built-in PHP features for precise static code analysis. In: Proceedings of the 21st Network and Distributed System Security Symposium (Feb 2014)"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771787"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume":"7","author":"Dem\u02c7","year":"2006","unstructured":"Dem\u02c7 sar, J.: Statistical comparisons of classifiers over multiple data sets. The Journal of Machine Learning Research 7 , 1 \u2013 30 ( Dec 2006 ) Dem\u02c7 sar, J.: Statistical comparisons of classifiers over multiple data sets. The Journal of Machine Learning Research 7, 1\u201330 (Dec 2006)","journal-title":"The Journal of Machine Learning Research"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.20"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134744.1134751"},{"key":"e_1_3_2_1_8_1","volume-title":"Martin","author":"Jurafsky D.","year":"2008","unstructured":"Jurafsky , D. , Martin , J.H. : Speech and Language Processing. Prentice Hall ( 2008 ) Jurafsky, D., Martin, J.H.: Speech and Language Processing. Prentice Hall (2008)"},{"key":"e_1_3_2_1_9_1","volume-title":"Correia","author":"Medeiros I.","year":"2016","unstructured":"Medeiros , I. , Neves , N.F. , Correia , M. : Additional info on the paper to ISSTA 2016 (Jan 2016), https:\/\/sites.google.com\/site\/siteaddinfo\/issta2016 Medeiros, I., Neves, N.F., Correia, M.: Additional info on the paper to ISSTA 2016 (Jan 2016), https:\/\/sites.google.com\/site\/siteaddinfo\/issta2016"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2457411"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.16"},{"key":"e_1_3_2_1_12_1","unstructured":"OSVDB\n  : http:\/\/osvdb.org  OSVDB: http:\/\/osvdb.org"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/108235.108253"},{"key":"e_1_3_2_1_14_1","unstructured":"SchoolMate: Http:\/\/sourceforge.net\/projects\/schoolmate\/  SchoolMate: Http:\/\/sourceforge.net\/projects\/schoolmate\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337399"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351733"},{"key":"e_1_3_2_1_17_1","volume-title":"Ashley Madison condemns attack as experts say hacked database is real","author":"TheGuardian","year":"2015","unstructured":"TheGuardian : Ashley Madison condemns attack as experts say hacked database is real ( 2015 ), http:\/\/www.theguardian.com\/technology\/2015\/aug\/19\/ ashley-madisons-hacked-customer-files-posted-onlineas-threatened-say-reports TheGuardian: Ashley Madison condemns attack as experts say hacked database is real (2015), http:\/\/www.theguardian.com\/technology\/2015\/aug\/19\/ ashley-madisons-hacked-customer-files-posted-onlineas-threatened-say-reports"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"e_1_3_2_1_19_1","volume-title":"Wichers","author":"Williams J.","year":"2013","unstructured":"Williams , J. , Wichers , D. : OWASP Top 10 2013 \u2013 the ten most critical web application security risks (2013) Williams, J., Wichers, D.: OWASP Top 10 2013 \u2013 the ten most critical web application security risks (2013)"},{"key":"e_1_3_2_1_20_1","volume-title":"Hall","author":"Witten I.H.","year":"2011","unstructured":"Witten , I.H. , Frank , E. , Hall , M.A. : Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann , 3 rd edn. ( 2011 ) Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 3rd edn. (2011)","edition":"3"},{"key":"e_1_3_2_1_21_1","unstructured":"WordPress: https:\/\/wordpress.org\/  WordPress: https:\/\/wordpress.org\/"},{"key":"e_1_3_2_1_22_1","unstructured":"ZeroCMS: Content management system built using PHP and MySQL http:\/\/www.aas9.in\/zerocms\/  ZeroCMS: Content management system built using PHP and MySQL http:\/\/www.aas9.in\/zerocms\/"}],"event":{"name":"ISSTA '16: International Symposium on Software Testing and Analysis","location":"Saarbr\u00fccken Germany","acronym":"ISSTA '16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 25th International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2931037.2931041","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2931037.2931041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:55:55Z","timestamp":1750222555000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2931037.2931041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,18]]},"references-count":22,"alternative-id":["10.1145\/2931037.2931041","10.1145\/2931037"],"URL":"https:\/\/doi.org\/10.1145\/2931037.2931041","relation":{},"subject":[],"published":{"date-parts":[[2016,7,18]]},"assertion":[{"value":"2016-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}