{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:15:31Z","timestamp":1775873731409,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of Naval Research","award":["ONR-N00014-17-1-2498"],"award-info":[{"award-number":["ONR-N00014-17-1-2498"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1565827"],"award-info":[{"award-number":["1565827"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3180201","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"372-383","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":113,"title":["Secure coding practices in Java"],"prefix":"10.1145","author":[{"given":"Na","family":"Meng","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Stefan","family":"Nagy","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Danfeng (Daphne)","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Wenjie","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Gustavo Arango","family":"Argoty","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_2_1_2_1","unstructured":"AES-256 implementation in GAE. https:\/\/stackoverflow.com\/questions\/12833826\/aes-256-implementation-in-gae."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache Shiro documentation. https:\/\/shiro.apache.org\/documentation.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Application Server - Oracle WebLogic Server. https:\/\/www.oracle.com\/middleware\/weblogic\/index.html."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"key":"e_1_3_2_1_6_1","unstructured":"Basic Program for encrypt\/Decrypt : javax.crypto.BadPaddingException:Decryption error. https:\/\/stackoverflow.com\/questions\/39518979\/basic-program-for-encrypt-decrypt-javax-crypto-badpaddingexception-decryption."},{"key":"e_1_3_2_1_7_1","unstructured":"BigInteger to Key. https:\/\/stackoverflow.com\/questions\/10271164\/biginteger-to-key."},{"issue":"2","key":"e_1_3_2_1_8_1","first-page":"112","article-title":"Security of passwords","volume":"8","author":"Boonkrong S.","year":"2012","unstructured":"S. Boonkrong. Security of passwords. Information Technology Journal, 8(2):112--117, 2012.","journal-title":"Information Technology Journal"},{"key":"e_1_3_2_1_9_1","unstructured":"Bouncy castle. https:\/\/www.bouncycastle.org."},{"key":"e_1_3_2_1_10_1","unstructured":"Can a secret be hidden in a 'safe' Java class offering access credentials? https:\/\/stackoverflow.com\/questions\/5761519\/can-a-secret-be-hidden-in-a-safe-java-class-offering-access-credentials."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.11.017"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262471"},{"key":"e_1_3_2_1_13_1","unstructured":"Communication with server that support SSL in Java. https:\/\/stackoverflow.com\/questions\/21156929\/java-class-to-trust-all-for-sending-file-to-https-web-service."},{"key":"e_1_3_2_1_14_1","unstructured":"Compare two Public Key values in Java (duplicate). https:\/\/stackoverflow.com\/questions\/37439695\/compare-two-public-key-values-in-java."},{"key":"e_1_3_2_1_15_1","unstructured":"Configure Spring Security without XML in Spring 4. https:\/\/stackoverflow.com\/questions\/20961600\/configure-spring-security-without-xml-in-spring-4."},{"key":"e_1_3_2_1_16_1","unstructured":"@Context injection in Stateless EJB used by JAX-RS. https:\/\/stackoverflow.com\/questions\/29132547\/context-injection-in-stateless-ejb-used-by-jax-rs."},{"key":"e_1_3_2_1_17_1","unstructured":"Converted secret key into bytes how to convert it back to secret key? https:\/\/stackoverflow.com\/questions\/5364338\/converted-secret-key-into-bytes-how-to-convert-it-back-to-secrect-key."},{"key":"e_1_3_2_1_18_1","unstructured":"Custom Authentication Filters in multiple HttpSecurity objects using Java Config. https:\/\/stackoverflow.com\/questions\/37304211\/custom-authentication-filters-in-multiple-httpsecurity-objects-using-java-config."},{"key":"e_1_3_2_1_19_1","unstructured":"CWE-227: Improper fulfillment of API contract (API abuse). https:\/\/cwe.mitre.org\/data\/definitions\/227.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.02.012"},{"key":"e_1_3_2_1_21_1","unstructured":"A. Dey and S. Weis. Keyczar: A Cryptographic Toolkit."},{"key":"e_1_3_2_1_22_1","unstructured":"Dictionary Attacks 101. https:\/\/blog.codinghorror.com\/dictionary-attacks-101\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_24_1","unstructured":"Encryption PHP Decryption Java. https:\/\/stackoverflow.com\/questions\/15639442\/encryption-php-decryption-java."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1481848.1481860"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6059-2_6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_30_1","unstructured":"Get public and private key from ASN1 encrypted pem certificate. https:\/\/stackoverflow.com\/questions\/30392114\/get-public-and-private-key-from-asn1-encrypted-pem-certificate."},{"key":"e_1_3_2_1_31_1","unstructured":"GlassFish. https:\/\/javaee.github.io\/glassfish\/."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/599797"},{"key":"e_1_3_2_1_33_1","unstructured":"Guidelines for the Selection Configuration and Use of Transport Layer Security (TLS) Implementations. http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-52r1.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.38"},{"key":"e_1_3_2_1_35_1","unstructured":"Hiding my security key from Java reflection. https:\/\/stackoverflow.com\/questions\/14903318\/hiding-my-security-key-from-java-reflection."},{"key":"e_1_3_2_1_36_1","unstructured":"How can I get a signed Java Applet to perform privileged operations when called from unsigned Javascript? https:\/\/stackoverflow.com\/questions\/1006674\/how-can-i-get-a-signed-java-applet-to-perform-privileged-operations-when-called."},{"key":"e_1_3_2_1_37_1","unstructured":"How does Java string being immutable increase security? https:\/\/stackoverflow.com\/questions\/15274874\/how-does-java-string-being-immutable-increase-security."},{"key":"e_1_3_2_1_38_1","unstructured":"How to accept self-signed certificates for JNDI\/LDAP connections? https:\/\/stackoverflow.com\/questions\/4615163\/how-to-accept-self-signed-certificates-for-jndi-ldap-connections."},{"key":"e_1_3_2_1_39_1","unstructured":"How to add MD5 or SHA hash to Spring security? https:\/\/stackoverflow.com\/questions\/18581463\/how-to-add-md5-or-sha-hash-to-spring-security."},{"key":"e_1_3_2_1_40_1","unstructured":"How to apply spring security filter only on secured end-points? https:\/\/stackoverflow.com\/questions\/36795894\/how-to-apply-spring-security-filter-only-on-secured-endpoints."},{"key":"e_1_3_2_1_41_1","unstructured":"How to generate secret key using SecureRandom.getInstanceStrong()? https:\/\/stackoverflow.com\/questions\/37244064\/how-to-generate-secret-key-using-securerandom-getinstancestrong."},{"key":"e_1_3_2_1_42_1","unstructured":"How to override Spring Security default configuration in Spring Boot. https:\/\/stackoverflow.com\/questions\/35600488\/how-to-override-spring-security-default-configuration-in-spring-boot."},{"key":"e_1_3_2_1_43_1","unstructured":"Implementing a Remote Interface. http:\/\/docs.oracle.com\/javase\/tutorial\/rmi\/implementing.html."},{"key":"e_1_3_2_1_44_1","unstructured":"InvalidKeySpecException : algid parse error not a sequence. https:\/\/stackoverflow.com\/questions\/31941413\/invalidkeyspecexception-algid-parse-error-not-a-sequence."},{"key":"e_1_3_2_1_45_1","unstructured":"Java authentication and authorization service (JAAS) reference guide. https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/jaas\/JAASRefGuide.html."},{"key":"e_1_3_2_1_46_1","unstructured":"Java class to trust all for sending file to HTTPS web service. https:\/\/stackoverflow.com\/questions\/21156929\/java-class-to-trust-all-for-sending-file-to-https-web-service."},{"key":"e_1_3_2_1_47_1","unstructured":"Java cryptography architecture. http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html."},{"key":"e_1_3_2_1_48_1","unstructured":"Java - Edit code sample to specify DES key value. https:\/\/stackoverflow.com\/questions\/22858497\/edit-code-sample-to-specify-des-key-value."},{"key":"e_1_3_2_1_49_1","unstructured":"Java EE 7 EJB Security not working. https:\/\/stackoverflow.com\/questions\/30504131\/java-ee-7-ejb-security-not-working."},{"key":"e_1_3_2_1_50_1","unstructured":"Java Mail get mails with pop3 from exchange server Exception in thread \"main\" javax.mail.MessagingException. https:\/\/stackoverflow.com\/questions\/25017050\/java-mail-get-mails-with-pop3-from-exchange-server-exception-in-thread-main."},{"key":"e_1_3_2_1_51_1","unstructured":"Java RMI \/ access denied. https:\/\/stackoverflow.com\/questions\/36570012\/java-rmi-access-denied."},{"key":"e_1_3_2_1_52_1","unstructured":"Java security init Cipher from SecretKeySpec properly. https:\/\/stackoverflow.com\/questions\/14230096\/java-security-init-cipher-from-secretkeyspec-properly."},{"key":"e_1_3_2_1_53_1","unstructured":"Java Security Manager completely disable reflection. https:\/\/stackoverflow.com\/questions\/40218973\/java-security-manager-completely-disable-reflection."},{"key":"e_1_3_2_1_54_1","unstructured":"Java security overview. http:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/overview\/jsoverview.html."},{"key":"e_1_3_2_1_55_1","unstructured":"Java Security - RSA Public Key & Private Key Code Issue. https:\/\/stackoverflow.com\/questions\/18757114\/java-security-rsa-public-key-private-key-code-issue."},{"key":"e_1_3_2_1_56_1","unstructured":"Java security: Sandboxing plugins loaded via URLClass-Loader. https:\/\/stackoverflow.com\/questions\/3947558\/java-security-sandboxing-plugins-loaded-via-urlclassloader."},{"key":"e_1_3_2_1_57_1","unstructured":"Java - Simple example of Spring Security with Thymeleaf. https:\/\/stackoverflow.com\/questions\/25692735\/simple-example-of-spring-security-with-thymeleaf."},{"key":"e_1_3_2_1_58_1","unstructured":"Java SSL - InstallCert recognizes certificate but still \"unable to find valid certification path\" error? https:\/\/stackoverflow.com\/questions\/11087121\/java-ssl-installcert-recognizes-certificate-but-still-unable-to-find-valid-c."},{"key":"e_1_3_2_1_59_1","unstructured":"JSR-000366 Java platform enterprise edition 8 public review specification. http:\/\/download.oracle.com\/otndocs\/jcp\/java_ee-8-pr-spec\/."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637166.2637237"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11698-3_27"},{"key":"e_1_3_2_1_62_1","unstructured":"Logout call - Spring security logout call. https:\/\/stackoverflow.com\/questions\/ 24530603\/spring-security-logout-call."},{"key":"e_1_3_2_1_64_1","unstructured":"MD5 hashing in Android. https:\/\/stackoverflow.com\/questions\/4846484\/md5- hashing- in- android."},{"key":"e_1_3_2_1_65_1","volume-title":"Network and Distributed Systems Symposium. Internet Society","author":"Mettler A.","year":"2010","unstructured":"A. Mettler, D. Wagner, and T. Close. Joe-E: A security-oriented subset of Java. In Network and Distributed Systems Symposium. Internet Society, 2010."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884384"},{"key":"e_1_3_2_1_67_1","volume-title":"This POODLE bites: exploiting the SSL 3.0 fallback","author":"M\u00f6ller B.","year":"2014","unstructured":"B. M\u00f6ller, T. Duong, and K. Kotowicz. This POODLE bites: exploiting the SSL 3.0 fallback, 2014."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884790"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","unstructured":"S. Oaks. Java Security. O'Reilly & Associates Inc. Sebastopol CA USA 1998.","DOI":"10.5555\/286063"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766522"},{"key":"e_1_3_2_1_71_1","unstructured":"PicketLink \/ Deltaspike security does not work in SOAP (JAX-WS) layer (CDI vs EJB?). https:\/\/stackoverflow.com\/questions\/32392702\/picketlink-deltaspike-security-does-not-work- in-soap-jax-ws-layer-cdi-vs-ej."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.23"},{"key":"e_1_3_2_1_73_1","volume-title":"An empirical case study on Stack Overflow to explore developers' security challenges. Master's thesis","author":"Rahman M. S.","year":"2016","unstructured":"M. S. Rahman. An empirical case study on Stack Overflow to explore developers' security challenges. Master's thesis, Kansas State University, 2016."},{"key":"e_1_3_2_1_74_1","volume-title":"http:\/\/www.infoworld.com\/article\/3003197\/security\/library-misuse-exposes-leading-java-platforms-to-attack.html","author":"Rashid F. Y.","year":"2017","unstructured":"F. Y. Rashid. Library misuse exposes leading Java platforms to attack. http:\/\/www.infoworld.com\/article\/3003197\/security\/library-misuse-exposes-leading-java-platforms-to-attack.html, 2017."},{"key":"e_1_3_2_1_75_1","unstructured":"Resteasy Authorization design - check a user owns a resource. https:\/\/stackoverflow.com\/questions\/34315838\/resteasy-authorization-design-check-a-user-owns-a-resource."},{"key":"e_1_3_2_1_76_1","unstructured":"RF 6101 - The Secure Sockets Layer (SSL) Protocol Version 3.0. https:\/\/tools.ietf.org\/html\/rfc6101."},{"key":"e_1_3_2_1_77_1","unstructured":"Scrapy - A Fast and Powerful Scraping and Web Crawling Framework. https:\/\/scrapy.org."},{"key":"e_1_3_2_1_78_1","unstructured":"Security - Allowing Java to use an untrusted certificate for SSL\/HTTPS connection. https:\/\/stackoverflow.com\/questions\/1201048\/allowing-java-to-use-an-untrusted-certificate-for-ssl-https-connection."},{"key":"e_1_3_2_1_79_1","unstructured":"Security exception when loading web image in jar. https:\/\/stackoverflow.com\/questions\/2011407\/security-exception-when-loading-web-image-in-jar."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.22"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/1517424.1517430"},{"key":"e_1_3_2_1_82_1","unstructured":"Spring security. https:\/\/projects.spring.io\/spring-security\/."},{"key":"e_1_3_2_1_83_1","unstructured":"Spring Security 4 XML configuration UserDetailsService authentication not working. https:\/\/stackoverflow.com\/questions\/41321176\/spring-security-4-xml-configuration-userdetailsservice-authentication-not-workin."},{"key":"e_1_3_2_1_84_1","unstructured":"Spring security JDK based proxy issue while using @Secured annotation on Controller method. https:\/\/stackoverflow.com\/questions\/35860442\/spring-security-jdk-based-proxy-issue-while-using-secured-annotation-on-control."},{"key":"e_1_3_2_1_85_1","unstructured":"Spring Security Reference. http:\/\/docs.spring.io\/spring-security\/site\/docs\/3.2.4.RELEASE\/reference\/htmlsingle\/#jc-httpsecurity."},{"key":"e_1_3_2_1_86_1","unstructured":"Spring Security Tutorial. http:\/\/www.mkyong.com\/tutorials\/spring-security-tutorials\/."},{"key":"e_1_3_2_1_87_1","unstructured":"Spring Security using JBoss &lt;security-domain&gt;. https:\/\/stackoverflow.com\/questions\/28172056\/spring-security-using-jboss-security-domain."},{"key":"e_1_3_2_1_88_1","unstructured":"SSL Certificate Verification: javax.net.ssl.SSLHandshakeException.https:\/\/stackoverflow.com\/questions\/25079751\/ssl-certificate-verification-javax-net-ssl-sslhandshakeexception."},{"key":"e_1_3_2_1_89_1","unstructured":"SSL handshake fails with unable to find valid certification path to requested target. https:\/\/stackoverflow.com\/questions\/40977556\/ssl-handshake-fails-with-unable-to-find-valid-certification-path-to-requested-ta."},{"key":"e_1_3_2_1_90_1","unstructured":"SSL Socket Connection working even though client is not sending certificate? https:\/\/stackoverflow.com\/questions\/26761966\/ssl-socket-connection-working-even-though-client-is-not-sending-certificate."},{"key":"e_1_3_2_1_91_1","unstructured":"StackOverflow. https:\/\/stackoverflow.com."},{"key":"e_1_3_2_1_92_1","unstructured":"J. Steven and J. Manico. Password storage cheat sheet. https:\/\/www.owasp.org\/index.php\/Password_Storage_Cheat_Sheet."},{"key":"e_1_3_2_1_94_1","unstructured":"The Webserver I talk to updated its SSL cert and now my app can't talk to it. https:\/\/stackoverflow.com\/questions\/5758812\/the-webserver-i-talk-to-updated-its-ssl-cert-and-now-my-app-cant-talk-to-it."},{"key":"e_1_3_2_1_95_1","unstructured":"Trusting all certificates using HttpClient over HTTPS. https:\/\/stackoverflow.com\/questions\/2642777\/trusting- all-certificates-using-httpclient-over-https."},{"key":"e_1_3_2_1_96_1","unstructured":"Use of ECC in Java SE 1.7. https:\/\/stackoverflow.com\/questions\/24383637\/use-of-ecc-in-java-se-1-7."},{"key":"e_1_3_2_1_97_1","unstructured":"Using public key from authorized_keys with Java security. https:\/\/stackoverflow.com\/questions\/3531506\/using-public-key-from-authorized-keys-with-java-security."},{"key":"e_1_3_2_1_98_1","volume-title":"https:\/\/www.veracode.com\/sites\/default\/files\/Resources\/Reports\/state-of-software-security-volume-7-veracode-report.pdf","author":"State of software security.","year":"2016","unstructured":"State of software security. https:\/\/www.veracode.com\/sites\/default\/files\/Resources\/Reports\/state-of-software-security-volume-7-veracode-report.pdf, 2016. Veracode."},{"key":"e_1_3_2_1_99_1","volume-title":"MD5, HAVAL-128 and RIPEMD","author":"Wang X.","year":"2004","unstructured":"X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, 2004. http:\/\/eprint.iacr.org\/2004\/199."},{"key":"e_1_3_2_1_100_1","unstructured":"Web Security Samples. https:\/\/github.com\/spring-projects\/spring-security-javaconfig\/blob\/master\/samples-web.md#sample-multi-http-web-configuration."},{"key":"e_1_3_2_1_101_1","unstructured":"WebSphere Application Server - IBM. http:\/\/www-03.ibm.com\/software\/products\/en\/appserv-was."},{"key":"e_1_3_2_1_102_1","unstructured":"When a TrustManagerFactory is not a TrustManagerFactory (Java). https:\/\/stackoverflow.com\/questions\/14654639\/when-a-trustmanagerfactory-is-not-a-trustmanagerfactory-java."},{"key":"e_1_3_2_1_103_1","unstructured":"When I try to convert a string with certificate exception is raised. https:\/\/stackoverflow.com\/questions\/10594000\/when-i- try-to-convert-a-string-with-certificate-exception-is-raised."},{"key":"e_1_3_2_1_104_1","unstructured":"WildFly. http:\/\/wildfly.org."},{"key":"e_1_3_2_1_105_1","unstructured":"Wildfly 9 security domains won't work. https:\/\/stackoverflow.com\/questions\/37425056\/wildfly-9-security-domains-wont-work."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1672-0"},{"key":"e_1_3_2_1_107_1","volume-title":"Cross-site request forgeries: Exploitation and prevention. https:\/\/www.cs.utexas.edu\/~shmat\/courses\/library\/zeller.pdf","author":"Zeller W.","year":"2008","unstructured":"W. Zeller and E. W. Felten. Cross-site request forgeries: Exploitation and prevention. https:\/\/www.cs.utexas.edu\/~shmat\/courses\/library\/zeller.pdf, 2008."}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180201","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180201","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:19Z","timestamp":1750208899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180201"}},"subtitle":["challenges and vulnerabilities"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":105,"alternative-id":["10.1145\/3180155.3180201","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3180201","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}