{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:08:56Z","timestamp":1766066936697,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T00:00:00Z","timestamp":1536537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,10]]},"DOI":"10.1145\/3233027.3233042","type":"proceedings-article","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T12:37:00Z","timestamp":1537447020000},"page":"149-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Understanding vulnerabilities in plugin-based web systems"],"prefix":"10.1145","author":[{"given":"Oslien","family":"Mesa","sequence":"first","affiliation":[{"name":"Pontifical Catholic University of Rio, de Janeiro Rio de Janeiro"}]},{"given":"Reginaldo","family":"Vieira","sequence":"additional","affiliation":[{"name":"Federal University of S\u00e3o Jo\u00e3o del-Rei"}]},{"given":"Marx","family":"Viana","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio, de Janeiro Rio de Janeiro"}]},{"given":"Vinicius H. S.","family":"Durelli","sequence":"additional","affiliation":[{"name":"Federal University of S\u00e3o Jo\u00e3o del-Rei"}]},{"given":"Elder","family":"Cirilo","sequence":"additional","affiliation":[{"name":"Federal University of S\u00e3o Jo\u00e3o del-Rei"}]},{"given":"Marcos","family":"Kalinowski","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio, de Janeiro Rio de Janeiro"}]},{"given":"Carlos","family":"Lucena","sequence":"additional","affiliation":[{"name":"Pontifical Catholic University of Rio, de Janeiro Rio de Janeiro"}]}],"member":"320","published-online":{"date-parts":[[2018,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.55"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.002"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.1661316"},{"key":"e_1_3_2_1_4_1","unstructured":"Chris Anley. 2007. The Shellcoder's Handbook: Discovering and Exploiting Security Holes (2nd ed.). Wiley. 744 pages.   Chris Anley. 2007. The Shellcoder's Handbook: Discovering and Exploiting Security Holes (2nd ed.). Wiley. 744 pages."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.889093"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0226"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6156"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799939"},{"key":"e_1_3_2_1_11_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1753235.1753251"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635880"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595728"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.31"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934467"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.20"},{"volume-title":"Markets, information and communication","author":"Garzarelli Giampaolo","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337253"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2016.34"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.23"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.31"},{"volume-title":"Proceedings of Workshop on Software Security Assurance Tools, Techniques, and Metrics.","year":"2005","author":"Martin Robert A","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"e_1_3_2_1_29_1","first-page":"61","article-title":"Product platforms in software development","volume":"40","author":"Meyer Marc H","year":"1998","journal-title":"MIT Sloan Management Review"},{"volume-title":"Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272)","author":"Munson J. C.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Glenford J. Myers Corey Sandler and Tom Badgett. 2011. The Art of Software Testing (3rd ed.). Wiley. 240 pages.   Glenford J. Myers Corey Sandler and Tom Badgett. 2011. The Art of Software Testing (3rd ed.). Wiley. 240 pages."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568300"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Birgit Penzenstadler Ankita Raturi Debra Richardson and Bill Tomlinson. 2014. Safety security now sustainability: The nonfunctional requirement for the 21st century. IEEE software 31 3 (2014) 40--47.  Birgit Penzenstadler Ankita Raturi Debra Richardson and Bill Tomlinson. 2014. Safety security now sustainability: The nonfunctional requirement for the 21st century. IEEE software 31 3 (2014) 40--47.","DOI":"10.1109\/MS.2014.22"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2666604"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635925"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.12.021"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.12.021"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"volume-title":"Workshop of Global Software Development.","year":"2014","author":"Steinmacher Igor","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797433.2797477"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70712"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1853919.1853921"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5314215"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1108\/00330330610681295"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531722"}],"event":{"name":"SPLC '18: 22nd International Systems and Software Product Line Conference","acronym":"SPLC '18","location":"Gothenburg Sweden"},"container-title":["Proceedings of the 22nd International Systems and Software Product Line Conference - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3233027.3233042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3233027.3233042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:54Z","timestamp":1750212474000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3233027.3233042"}},"subtitle":["an exploratory study of wordpress"],"short-title":[],"issued":{"date-parts":[[2018,9,10]]},"references-count":47,"alternative-id":["10.1145\/3233027.3233042","10.1145\/3233027"],"URL":"https:\/\/doi.org\/10.1145\/3233027.3233042","relation":{},"subject":[],"published":{"date-parts":[[2018,9,10]]},"assertion":[{"value":"2018-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}