{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:40Z","timestamp":1750306180554,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,11]]},"DOI":"10.1145\/2987386.2987432","type":"proceedings-article","created":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T14:02:02Z","timestamp":1479736922000},"page":"148-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Runtime Input Validation for Java Web Applications using Static Bytecode Instrumentation"],"prefix":"10.1145","author":[{"given":"Sangwook","family":"Cho","sequence":"first","affiliation":[{"name":"Dept. of Computer Science and Engineering, Dankook University, Yongin, Korea"}]},{"given":"Gyoosik","family":"Kim","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, Dankook University, Yongin, Korea"}]},{"given":"Seong-je","family":"Cho","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, Dankook University, Yongin, Korea"}]},{"given":"Jongmoo","family":"Choi","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science and Engineering, Dankook University, Yongin, Korea"}]},{"given":"Minkyu","family":"Park","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Konkuk University, Chungju, Korea"}]},{"given":"Sangchul","family":"Han","sequence":"additional","affiliation":[{"name":"Dept. of Computer Engineering, Konkuk University, Chungju, Korea"}]}],"member":"320","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ASM. OW2 Consortium. http:\/\/asm.ow2.org\/  ASM. OW2 Consortium. http:\/\/asm.ow2.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294325.1294344"},{"key":"e_1_3_2_1_3_1","unstructured":"Dhamankar R. Dausin M. Eisenbarth M. and King J. 2009. The top cyber security risks (2009). http:\/\/www.sans.org\/top-cyber-security-risks\/  Dhamankar R. Dausin M. Eisenbarth M. and King J. 2009. The top cyber security risks (2009). http:\/\/www.sans.org\/top-cyber-security-risks\/"},{"key":"e_1_3_2_1_4_1","unstructured":"EDB Report. Penta Security. https:\/\/www.pentasecurity.com\/wp\/?page_id=185  EDB Report. Penta Security. https:\/\/www.pentasecurity.com\/wp\/?page_id=185"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01973-9_78"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138926"},{"key":"e_1_3_2_1_7_1","unstructured":"Gwak H.-G. 2011. Reusability Enhancing Model of Java Application using Aspect-Oriented Programming. Master's Thesis. Soongsil Universiry. 12.2011.  Gwak H.-G. 2011. Reusability Enhancing Model of Java Application using Aspect-Oriented Programming. Master's Thesis. Soongsil Universiry. 12.2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162077"},{"key":"e_1_3_2_1_9_1","unstructured":"Martin B. Brown M. Paller A. and Kirby D. 2011. CWE\/SANS top 25 most dangerous software errors (2011). http:\/\/cwe.mitre.org\/top25\/  Martin B. Brown M. Paller A. and Kirby D. 2011. CWE\/SANS top 25 most dangerous software errors (2011). http:\/\/cwe.mitre.org\/top25\/"},{"key":"e_1_3_2_1_10_1","unstructured":"MITRE. Common Weakness Enumeration (CWE). https:\/\/cwe.mitre.org  MITRE. Common Weakness Enumeration (CWE). https:\/\/cwe.mitre.org"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.013"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.34"},{"key":"e_1_3_2_1_14_1","unstructured":"Source code instrumentation overview. IBM Knowledge Center.  Source code instrumentation overview. IBM Knowledge Center."},{"key":"e_1_3_2_1_15_1","unstructured":"The Open Web Application Security Project (OWASP). https:\/\/www.owasp.org.  The Open Web Application Security Project (OWASP). https:\/\/www.owasp.org."},{"key":"e_1_3_2_1_16_1","unstructured":"The Structure of the Java Virtual Machine. https:\/\/docs.oracle.com\/javase\/specs\/jvms\/se7\/html\/jvms-2.html#jvms-2.6  The Structure of the Java Virtual Machine. https:\/\/docs.oracle.com\/javase\/specs\/jvms\/se7\/html\/jvms-2.html#jvms-2.6"},{"key":"e_1_3_2_1_17_1","unstructured":"Venners B. The Java Virtual Machine: The Java Stack. http:\/\/www.artima.com\/insidejvm\/ed2\/jvm8.html  Venners B. The Java Virtual Machine: The Java Stack. http:\/\/www.artima.com\/insidejvm\/ed2\/jvm8.html"}],"event":{"name":"RACS '16: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Odense Denmark","acronym":"RACS '16"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987386.2987432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:59Z","timestamp":1750218599000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":17,"alternative-id":["10.1145\/2987386.2987432","10.1145\/2987386"],"URL":"https:\/\/doi.org\/10.1145\/2987386.2987432","relation":{},"subject":[],"published":{"date-parts":[[2016,10,11]]},"assertion":[{"value":"2016-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}