{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:25Z","timestamp":1775188105417,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416540","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"598-610","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Automated implementation of windows-related security-configuration guides"],"prefix":"10.1145","author":[{"given":"Patrick","family":"St\u00f6ckle","sequence":"first","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]},{"given":"Bernd","family":"Grobauer","sequence":"additional","affiliation":[{"name":"Siemens AG, Munich, Germany"}]},{"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit. \"O'Reilly Media","author":"Bird Steven","unstructured":"Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_2_1","volume-title":"Montville","author":"Birkholz Henk","year":"2018","unstructured":"Henk Birkholz, Jarrett Lu, John Strassner, Nancy Cam-Winget, and Adam W. Montville. 2018. Security Automation and Continuous Monitoring (SACM) Terminology. Internet-Draft draft-ietf-sacm-terminology-16. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sacm-terminology-16 Work in Progress."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Nancy Cam-Winget and Lisa Lorenzin. 2017. Security Automation and Continuous Monitoring (SACM) Requirements. RFC 8248. 10.17487\/RFC8248","DOI":"10.17487\/RFC8248"},{"key":"e_1_3_2_1_4_1","unstructured":"CIS. 2019. CIS-CAT Pro. https:\/\/www.cisecurity.org\/cybersecurity-tools\/cis-cat-pro\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274736"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243794"},{"key":"e_1_3_2_1_7_1","unstructured":"DISA. 2019. DISA Microsoft Windows Server 2016 STIG Benchmark. Available from https:\/\/dl.dod.cyber.mil\/wp-content\/uploads\/stigs\/zip\/U_MS_Windows_Server_2016_V1R13_STIG_SCAP_1-2_Benchmark.zip. Accessed: 2019-01-22 we used the version 7 current version is 13."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.41"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_1_11_1","volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir I","unstructured":"Vladimir I Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. 707--710."},{"key":"e_1_3_2_1_12_1","unstructured":"Microsoft Corporation. 2016. Local Group Policy Object Utility. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=55319 Accessed: 2019-01-18."},{"key":"e_1_3_2_1_13_1","unstructured":"Microsoft Corporation. 2017. Security policy settings. https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/security-policy-settings\/security-policy-settings"},{"key":"e_1_3_2_1_14_1","volume-title":"Montville and Bill Munyan","author":"Adam","year":"2018","unstructured":"Adam W. Montville and Bill Munyan. 2018. Security Automation and Continuous Monitoring (SACM) Architecture. Internet-Draft draft-ietf-sacm-arch-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-sacm-arch-00 Work in Progress."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337319"},{"key":"e_1_3_2_1_16_1","unstructured":"Martin Preisler and Marek Haicman. 2018. Security Automation for Containers and VMs with OpenSCAP. In USENIX LISA. Washington. Available from https:\/\/martin.preisler.me\/..."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the CAiSE'2015 Doctoral Consortium at the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015","author":"Raab Markus","year":"2015","unstructured":"Markus Raab. 2015. Safe Management of Software Configuration. In Proceedings of the CAiSE'2015 Doctoral Consortium at the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), Stockholm, Sweden, June 11--12, 2015. 74--82. http:\/\/ceur-ws.org\/Vol-1415\/CAISE2015DC09.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892664.2892691"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57735-7_11"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00033"},{"key":"e_1_3_2_1_22_1","unstructured":"Red Hat Inc. 2010. OpenSCAP. https:\/\/www.open-scap.org. Accessed: 2018-12-18."},{"key":"e_1_3_2_1_23_1","unstructured":"SaltStack Inc. 2011. SaltStack. https:\/\/github.com\/saltstack\/salt Accessed: 2019-01-07."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133888"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"M. Sayagh and A. E. Hassan. 2020. ConfigMiner: Identifying the Appropriate Configuration Options for Config-related User Questions by Mining Online Forums. IEEE Transactions on Software Engineering (2020) 1--1. 10.1109\/TSE.2020.2973997","DOI":"10.1109\/TSE.2020.2973997"},{"key":"e_1_3_2_1_26_1","unstructured":"Patrick St\u00f6ckle Bernd Grobauer and Alexander Pretschner. 2020. Repository to demonstrate the steps of the automated hardening process. https:\/\/github.com\/tum-i22\/disa-windows-server-2016 swh:1:dir:c3803619f51702199b19405547e2be2f2f55bdd2."},{"key":"e_1_3_2_1_27_1","unstructured":"Patrick St\u00f6ckle Bernd Grobauer and Alexander Pretschner. 2020. Repository with the check results for CIS guides before and after implementing the guides. https:\/\/github.com\/tum-i22\/CIS-Benchmark-Evaluation swh:1:dir:b5c15f48b2c288f58533c9354bea3703ffbbb0dd."},{"key":"e_1_3_2_1_28_1","volume-title":"Updated version of the step repository with Windows Server","author":"St\u00f6ckle Patrick","year":"2019","unstructured":"Patrick St\u00f6ckle, Bernd Grobauer, and Alexander Pretschner. 2020. Updated version of the step repository with Windows Server 2019. https:\/\/github.com\/tum-i22\/disa-windows-server-2019 swh:1:dir:13ffd9d2566c64afdedd414336a95a35605392d7."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294284"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294276"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815401"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455802"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.78"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"e_1_3_2_1_36_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Xu Tianyin","year":"2016","unstructured":"Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, and Shankar Pasupathy. 2016. Early Detection of Configuration Errors to Reduce Failure Damage. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 619--634. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/xu"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791577"},{"key":"e_1_3_2_1_39_1","volume-title":"2018 IEEE\/ACM 15th International Conference on Mining Software Repositories (MSR). 454--464","author":"Yang J.","unstructured":"J. Yang, E. Wittern, A. T. T. Ying, J. Dolby, and L. Tan. 2018. Towards Extracting Web API Specifications from Documentation. In 2018 IEEE\/ACM 15th International Conference on Mining Software Repositories (MSR). 454--464."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0082-3"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":40,"alternative-id":["10.1145\/3324884.3416540","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416540","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}