{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:30:12Z","timestamp":1772519412540,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea (NRF)","award":["2017073934"],"award-info":[{"award-number":["2017073934"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329840","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"646-657","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning"],"prefix":"10.1145","author":[{"given":"Sunnyeo","family":"Park","sequence":"first","affiliation":[{"name":"Korea Advanced Institute of Science &amp; Technology, Daejeon, South Korea"}]},{"given":"Dohyeok","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science &amp; Technology, Daejeon, South Korea"}]},{"given":"Sooel","family":"Son","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science &amp; Technology, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000794"},{"key":"e_1_3_2_1_2_1","volume-title":"2014 International Conference on. IEEE, 294--299","author":"Behl Diksha","year":"2014","unstructured":"Diksha Behl , Sahil Handa , and Anuja Arora . 2014 . A bug mining tool to identify and analyze security bugs using naive bayes and tf-idf. In Optimization, Reliabilty, and Information Technology (ICROIT) , 2014 International Conference on. IEEE, 294--299 . Diksha Behl, Sahil Handa, and Anuja Arora. 2014. A bug mining tool to identify and analyze security bugs using naive bayes and tf-idf. In Optimization, Reliabilty, and Information Technology (ICROIT), 2014 International Conference on. IEEE, 294--299."},{"key":"e_1_3_2_1_3_1","volume-title":"Noise Reduction in Speech Processing","author":"Benesty Jacob","unstructured":"Jacob Benesty , Jingdong Chen , Yiteng Huang , and Israel Cohen . 2009. Pearson Correlation Coefficient . In Noise Reduction in Speech Processing . Springer , 1--4. Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson Correlation Coefficient. In Noise Reduction in Speech Processing. Springer, 1--4."},{"key":"e_1_3_2_1_4_1","volume-title":"ECML PKDD Workshop: Languages for Data Mining and Machine Learning. 108--122","author":"Buitinck Lars","year":"2013","unstructured":"Lars Buitinck , Gilles Louppe , Mathieu Blondel , Fabian Pedregosa , Andreas Mueller , Olivier Grisel , Vlad Niculae , Peter Prettenhofer , Alexandre Gramfort , Jaques Grobler , Robert Layton , Jake Vander Plas , Arnaud Joly , Brian Holt , and Ga\u00ebl Varoquaux . 2013 . API design for machine learning software: experiences from the scikit-learn project . In ECML PKDD Workshop: Languages for Data Mining and Machine Learning. 108--122 . Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas Mueller, Olivier Grisel, Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort, Jaques Grobler, Robert Layton, Jake Vander Plas, Arnaud Joly, Brian Holt, and Ga\u00ebl Varoquaux. 2013. API design for machine learning software: experiences from the scikit-learn project. In ECML PKDD Workshop: Languages for Data Mining and Machine Learning. 108--122."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884844"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337364"},{"key":"e_1_3_2_1_7_1","unstructured":"CVE Details. 2019. Vulnerability Statistics Of Chrome. https:\/\/www.cvedetails.com\/product\/15031\/Google-Chrome.html?vendor_id=1224.  CVE Details. 2019. Vulnerability Statistics Of Chrome. https:\/\/www.cvedetails.com\/product\/15031\/Google-Chrome.html?vendor_id=1224."},{"key":"e_1_3_2_1_8_1","unstructured":"Jonathan Foote. 2018. GDB 'exploitable' plugin. https:\/\/github.com\/jfoote\/exploitable.  Jonathan Foote. 2018. GDB 'exploitable' plugin. https:\/\/github.com\/jfoote\/exploitable."},{"key":"e_1_3_2_1_9_1","volume-title":"Mining software repositories (MSR)","author":"Gegick Michael","year":"2010","unstructured":"Michael Gegick , Pete Rotella , and Tao Xie . 2010. Identifying security bug reports via text mining: An industrial case study . In Mining software repositories (MSR) , 2010 7th IEEE working conference on. IEEE , 11--20. Michael Gegick, Pete Rotella, and Tao Xie. 2010. Identifying security bug reports via text mining: An industrial case study. In Mining software repositories (MSR), 2010 7th IEEE working conference on. IEEE, 11--20."},{"key":"e_1_3_2_1_10_1","unstructured":"Google. 2016a. Chromium Issue 388665. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=388665.  Google. 2016a. Chromium Issue 388665. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=388665."},{"key":"e_1_3_2_1_11_1","unstructured":"Google. 2016b. Chromium Issue 595834. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=595834.  Google. 2016b. Chromium Issue 595834. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=595834."},{"key":"e_1_3_2_1_12_1","unstructured":"Google. 2018a. Chromium Issue 386988. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=386988.  Google. 2018a. Chromium Issue 386988. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=386988."},{"key":"e_1_3_2_1_13_1","unstructured":"Google. 2018b. Chromium Issue 610600. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=610600.  Google. 2018b. Chromium Issue 610600. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=610600."},{"key":"e_1_3_2_1_14_1","unstructured":"Google. 2018c. Chromium Issue 718858. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=718858.  Google. 2018c. Chromium Issue 718858. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=718858."},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2018 d. Chromium Issue 729991. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=729991.  Google. 2018 d. Chromium Issue 729991. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=729991."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2018 e. Chromium Issue 733549. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=733549.  Google. 2018 e. Chromium Issue 733549. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=733549."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2018 f. Reporting Security Bugs. https:\/\/dev.chromium.org\/Home\/chromium-security\/reporting-security-bugs.  Google. 2018 f. Reporting Security Bugs. https:\/\/dev.chromium.org\/Home\/chromium-security\/reporting-security-bugs."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2019 a. Chrome Reward Program Rules. https:\/\/www.google.com\/about\/appsecurity\/chrome-rewards\/.  Google. 2019 a. Chrome Reward Program Rules. https:\/\/www.google.com\/about\/appsecurity\/chrome-rewards\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2019 b. Chromium Issues. https:\/\/bugs.chromium.org\/p\/chromium\/.  Google. 2019 b. Chromium Issues. https:\/\/bugs.chromium.org\/p\/chromium\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2019 c. ClusterFuzz. https:\/\/github.com\/google\/clusterfuzz.  Google. 2019 c. ClusterFuzz. https:\/\/github.com\/google\/clusterfuzz."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2019 d. ClusterFuzz Crash type. https:\/\/google.github.io\/clusterfuzz\/reference\/glossary.  Google. 2019 d. ClusterFuzz Crash type. https:\/\/google.github.io\/clusterfuzz\/reference\/glossary."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2019 e. Google V8. https:\/\/chromium.googlesource.com\/v8\/v8\/.  Google. 2019 e. Google V8. https:\/\/chromium.googlesource.com\/v8\/v8\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"e_1_3_2_1_24_1","volume-title":"Intel 64 and IA-32 architectures software developer's manual","author":"Guide Part","year":"2016","unstructured":"Part Guide . 2016. Intel 64 and IA-32 architectures software developer's manual . Volume 3 (3A, 3B, 3C & 3D): System Programming Guide ( 2016 ). Part Guide. 2016. Intel 64 and IA-32 architectures software developer's manual. Volume 3 (3A, 3B, 3C & 3D): System Programming Guide (2016)."},{"key":"e_1_3_2_1_25_1","unstructured":"Mark Andrew. Hall. 1999. Correlation-Based Feature Selection for Machine Learning. (1999).  Mark Andrew. Hall. 1999. Correlation-Based Feature Selection for Machine Learning. (1999)."},{"key":"e_1_3_2_1_26_1","unstructured":"Choongwoo Han. 2019. Case Study of JavaScript Engine Vulnerabilities. https:\/\/github.com\/tunz\/js-vuln-db.  Choongwoo Han. 2019. Case Study of JavaScript Engine Vulnerabilities. https:\/\/github.com\/tunz\/js-vuln-db."},{"key":"e_1_3_2_1_27_1","volume-title":"Fuzzing with Code Fragments. In USENIX Security Symposium. 445--458","author":"Holler Christian","year":"2012","unstructured":"Christian Holler , Kim Herzig , and Andreas Zeller . 2012 . Fuzzing with Code Fragments. In USENIX Security Symposium. 445--458 . Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In USENIX Security Symposium. 445--458."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630070"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595715"},{"key":"e_1_3_2_1_30_1","volume-title":"Anand Rajaraman.","author":"Jeffrey","year":"2014","unstructured":"Jeffrey D. Ullman Jure Leskovec , Anand Rajaraman. 2014 . Mining of Massive Datasets . http:\/\/infolab.stanford.edu\/ ullman\/mmds\/book.pdf. Jeffrey D. Ullman Jure Leskovec, Anand Rajaraman. 2014. Mining of Massive Datasets. http:\/\/infolab.stanford.edu\/ ullman\/mmds\/book.pdf."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1230-3"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.20"},{"key":"e_1_3_2_1_33_1","volume-title":"Attacks leveraging exploits for Microsoft Office grew fourfold in early","author":"Lab Kaspersky","year":"2018","unstructured":"Kaspersky Lab . 2018. Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018 . https:\/\/www.kaspersky.com\/about\/press-releases\/2018_microsoft-office-exploits. Kaspersky Lab. 2018. Attacks leveraging exploits for Microsoft Office grew fourfold in early 2018. https:\/\/www.kaspersky.com\/about\/press-releases\/2018_microsoft-office-exploits."},{"key":"e_1_3_2_1_34_1","first-page":"1","article-title":"Imbalanced-learn: A Python Toolbox to Tackle the Curse of Imbalanced Datasets in Machine Learning","volume":"18","author":"Guillaume Lema\u00ee","year":"2017","unstructured":"Guillaume Lema\u00ee tre, Fernando Nogueira , and Christos K. Aridas . 2017 . Imbalanced-learn: A Python Toolbox to Tackle the Curse of Imbalanced Datasets in Machine Learning . Journal of Machine Learning Research , Vol. 18 , 17 (2017), 1 -- 5 . http:\/\/jmlr.org\/papers\/v18\/16--365.html Guillaume Lema\u00ee tre, Fernando Nogueira, and Christos K. Aridas. 2017. Imbalanced-learn: A Python Toolbox to Tackle the Curse of Imbalanced Datasets in Machine Learning. Journal of Machine Learning Research, Vol. 18, 17 (2017), 1--5. http:\/\/jmlr.org\/papers\/v18\/16--365.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_35_1","unstructured":"Microsoft. 2014. Definition of a Security Vulnerability. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/tn-archive\/cc751383(v=technet.10).  Microsoft. 2014. Definition of a Security Vulnerability. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/tn-archive\/cc751383(v=technet.10)."},{"key":"e_1_3_2_1_36_1","unstructured":"Microsoft. 2019 a. EdgeHTML issue tracker. https:\/\/developer.microsoft.com\/en-us\/microsoft-edge\/platform\/issues\/.  Microsoft. 2019 a. EdgeHTML issue tracker. https:\/\/developer.microsoft.com\/en-us\/microsoft-edge\/platform\/issues\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Microsoft. 2019 b. Microsoft ChakraCore. https:\/\/github.com\/Microsoft\/ChakraCore.  Microsoft. 2019 b. Microsoft ChakraCore. https:\/\/github.com\/Microsoft\/ChakraCore."},{"key":"e_1_3_2_1_38_1","unstructured":"Microsoft. 2019 c. Microsoft Edge on Windows Insider Preview Bounty Program. https:\/\/www.microsoft.com\/en-us\/msrc\/bounty-edge.  Microsoft. 2019 c. Microsoft Edge on Windows Insider Preview Bounty Program. https:\/\/www.microsoft.com\/en-us\/msrc\/bounty-edge."},{"key":"e_1_3_2_1_39_1","unstructured":"MITRE. 2018. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/.  MITRE. 2018. Common Weakness Enumeration. https:\/\/cwe.mitre.org\/."},{"key":"e_1_3_2_1_40_1","unstructured":"MITRE. 2019. CWE-762. https:\/\/cwe.mitre.org\/data\/definitions\/762.html.  MITRE. 2019. CWE-762. https:\/\/cwe.mitre.org\/data\/definitions\/762.html."},{"key":"e_1_3_2_1_41_1","unstructured":"Mozilla. {n. d.} a. Mozilla Bug Bounty Program. https:\/\/www.mozilla.org\/en-US\/security\/bug-bounty\/.  Mozilla. {n. d.} a. Mozilla Bug Bounty Program. https:\/\/www.mozilla.org\/en-US\/security\/bug-bounty\/."},{"key":"e_1_3_2_1_42_1","unstructured":"Mozilla. {n. d.} b. Mozilla Client Bug Bounty Program. https:\/\/www.mozilla.org\/en-US\/security\/client-bug-bounty\/.  Mozilla. {n. d.} b. Mozilla Client Bug Bounty Program. https:\/\/www.mozilla.org\/en-US\/security\/client-bug-bounty\/."},{"key":"e_1_3_2_1_43_1","unstructured":"Mozilla. 2017. Mozilla Bug 1344415. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1344415.  Mozilla. 2017. Mozilla Bug 1344415. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1344415."},{"key":"e_1_3_2_1_44_1","unstructured":"Mozilla. 2018a. Mozilla Bug 1493900. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1493900.  Mozilla. 2018a. Mozilla Bug 1493900. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1493900."},{"key":"e_1_3_2_1_45_1","unstructured":"Mozilla. 2018b. Mozilla Bug 1493903. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1493903.  Mozilla. 2018b. Mozilla Bug 1493903. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1493903."},{"key":"e_1_3_2_1_46_1","unstructured":"Mozilla. 2019 a. Bugzilla. https:\/\/bugzilla.mozilla.org\/.  Mozilla. 2019 a. Bugzilla. https:\/\/bugzilla.mozilla.org\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Mozilla. 2019 b. Exploitable crashes. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Security\/Exploitable_crashes.  Mozilla. 2019 b. Exploitable crashes. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Security\/Exploitable_crashes."},{"key":"e_1_3_2_1_48_1","unstructured":"Mozilla. 2019 c. Mozilla SpiderMonkey. https:\/\/github.com\/mozilla\/gecko-dev.  Mozilla. 2019 c. Mozilla SpiderMonkey. https:\/\/github.com\/mozilla\/gecko-dev."},{"key":"e_1_3_2_1_49_1","unstructured":"Mozilla. 2019 d. Security Advisories for Firefox. https:\/\/www.mozilla.org\/en-US\/security\/known-vulnerabilities\/firefox\/.  Mozilla. 2019 d. Security Advisories for Firefox. https:\/\/www.mozilla.org\/en-US\/security\/known-vulnerabilities\/firefox\/."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering. Citeseer.","author":"Murphy G","year":"2004","unstructured":"G Murphy and D Cubranic . 2004 . Automatic bug triage using text categorization . In Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering. Citeseer. G Murphy and D Cubranic. 2004. Automatic bug triage using text categorization. In Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering. Citeseer."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"e_1_3_2_1_53_1","unstructured":"Jesse Ruderman. 2007. Introducing jsfunfuzz. http:\/\/www.squarefree.com\/2007\/08\/02\/introducing-jsfunfuzz\/.  Jesse Ruderman. 2007. Introducing jsfunfuzz. http:\/\/www.squarefree.com\/2007\/08\/02\/introducing-jsfunfuzz\/."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463280"},{"key":"e_1_3_2_1_55_1","unstructured":"Offensive Security. 2019. Exploit Database. https:\/\/www.exploit-db.com\/.  Offensive Security. 2019. Exploit Database. https:\/\/www.exploit-db.com\/."},{"key":"e_1_3_2_1_56_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309--318","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov . 2012 . AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309--318 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309--318."},{"key":"e_1_3_2_1_57_1","unstructured":"Internet World Stats. 2019. INTERNET USAGE STATISTICS. https:\/\/www.internetworldstats.com\/stats.htm.  Internet World Stats. 2019. INTERNET USAGE STATISTICS. https:\/\/www.internetworldstats.com\/stats.htm."},{"key":"e_1_3_2_1_58_1","unstructured":"ChakraCore team. 2019. ChakraCore Roadmap. https:\/\/github.com\/Microsoft\/ChakraCore\/wiki\/Roadmap.  ChakraCore team. 2019. ChakraCore Roadmap. https:\/\/github.com\/Microsoft\/ChakraCore\/wiki\/Roadmap."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.48"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.30"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_29"},{"key":"e_1_3_2_1_62_1","unstructured":"W3Techs. 2019. Usage of JavaScript for websites. https:\/\/w3techs.com\/technologies\/details\/cp-javascript\/all\/all.  W3Techs. 2019. Usage of JavaScript for websites. https:\/\/w3techs.com\/technologies\/details\/cp-javascript\/all\/all."},{"key":"e_1_3_2_1_63_1","unstructured":"Webkit. 2019. Webkit JavaScriptCore. https:\/\/git.webkit.org\/.  Webkit. 2019. Webkit JavaScriptCore. https:\/\/git.webkit.org\/."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978340"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.10"},{"key":"e_1_3_2_1_67_1","unstructured":"ZERODIUM. 2019. ZERODIUM Exploit Acquisition Program. https:\/\/zerodium.com\/program.html.  ZERODIUM. 2019. ZERODIUM Exploit Acquisition Program. https:\/\/zerodium.com\/program.html."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196515"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329840","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":68,"alternative-id":["10.1145\/3321705.3329840","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329840","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}