{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T12:20:09Z","timestamp":1776687609437,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3243127.3243130","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"16-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Automatically assessing vulnerabilities discovered by compositional analysis"],"prefix":"10.1145","author":[{"given":"Saahil","family":"Ognawala","sequence":"first","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Ricardo Nales","family":"Amato","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Pooja","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. GNOME Bugzilla. https:\/\/bugzilla.gnome.org\/.  {n. d.}. GNOME Bugzilla. https:\/\/bugzilla.gnome.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. National Vulnerability Database (NVD). https:\/\/nvd.nist.gov\/. 2018. CVSS3 assessment using machine learning. https:\/\/osf.io\/g87ny\/?view_ only=21bf55c48263432f9b00702f84b23711  {n. d.}. National Vulnerability Database (NVD). https:\/\/nvd.nist.gov\/. 2018. CVSS3 assessment using machine learning. https:\/\/osf.io\/g87ny\/?view_ only=21bf55c48263432f9b00702f84b23711"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2630069"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321211.1321234"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453146"},{"key":"e_1_3_2_1_6_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In OSDI.","author":"Cadar C.","year":"2008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_1_8_1","volume-title":"Software Engineering (CONSEG), 2012 CSI Sixth International Conference on.","author":"Chaturvedi K."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970347"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23404-5_19"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"A. Dobrovoljc D. Tr\u010dek and B. Likar. 2017. Predicting Exploitations of Information Systems Vulnerabilities Through Attackers Characteristics. IEEE Access (2017).  A. Dobrovoljc D. Tr\u010dek and B. Likar. 2017. Predicting Exploitations of Information Systems Vulnerabilities Through Attackers Characteristics. IEEE Access (2017).","DOI":"10.1109\/ACCESS.2017.2769063"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00086-8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.98"},{"key":"e_1_3_2_1_14_1","unstructured":"P. Godefroid M. Levin etal 2008. Automated Whitebox Fuzz Testing.. In NDSS.  P. Godefroid M. Levin et al. 2008. Automated Whitebox Fuzz Testing.. In NDSS."},{"key":"e_1_3_2_1_15_1","unstructured":"J. Hennessy and D. Patterson. 2011. Computer architecture: a quantitative approach. Elsevier.   J. Hennessy and D. Patterson. 2011. Computer architecture: a quantitative approach. Elsevier."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.08.023"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.31"},{"key":"e_1_3_2_1_20_1","volume-title":"International Symposium on Code Generation and Optimization (CGO).","author":"Lattner C."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"K. Ma K. Phang etal 2011. Directed symbolic execution. In SAS.   K. Ma K. Phang et al. 2011. Directed symbolic execution. In SAS.","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_41"},{"key":"e_1_3_2_1_24_1","unstructured":"P. Mell K. Scarfone and S. Romanosky. 2007. A complete guide to the common vulnerability scoring system version 2.0. In Published by FIRST-Forum of Incident Response and Security Teams.  P. Mell K. Scarfone and S. Romanosky. 2007. A complete guide to the common vulnerability scoring system version 2.0. In Published by FIRST-Forum of Incident Response and Security Teams."},{"key":"e_1_3_2_1_25_1","volume-title":"Software Maintenance, 2008. ICSM 2008. IEEE International Conference on.","author":"Menzies T."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062558"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970281"},{"key":"e_1_3_2_1_29_1","volume-title":"Software Maintenance and Evolution (ICSME), 2016 IEEE International Conference on.","author":"Palomba F."},{"key":"e_1_3_2_1_30_1","volume-title":"Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research","author":"Pedregosa F.","year":"2011"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"A. Pretschner. 2003. Compositional generation of MC\/DC integration test suites. Electronic Notes in Theoretical Computer Science 82 (2003).  A. Pretschner. 2003. Compositional generation of MC\/DC integration test suites. Electronic Notes in Theoretical Computer Science 82 (2003).","DOI":"10.1016\/S1571-0661(04)81020-X"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.51"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.31"},{"key":"e_1_3_2_1_36_1","volume-title":"Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on.","author":"Torchiano M.","year":"2010"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.27"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"T. Wen Y. Zhang Y. Dong and G. Yang. 2015. A novel automatic severity vulnerability assessment framework. Journal of Communications (2015).  T. Wen Y. Zhang Y. Dong and G. Yang. 2015. A novel automatic severity vulnerability assessment framework. Journal of Communications (2015).","DOI":"10.12720\/jcm.10.5.320-329"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","location":"Montpellier France","acronym":"ASE '18","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243127.3243130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243127.3243130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:38Z","timestamp":1750208258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243127.3243130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":37,"alternative-id":["10.1145\/3243127.3243130","10.1145\/3243127"],"URL":"https:\/\/doi.org\/10.1145\/3243127.3243130","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}