{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T10:07:30Z","timestamp":1772532450411,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397375","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"286-297","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["DeepSQLi: deep semantic learning for testing SQL injection"],"prefix":"10.1145","author":[{"given":"Muyang","family":"Liu","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, China"}]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[{"name":"University of Exeter, UK"}]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[{"name":"Loughborough University, UK"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing. In FITTEST'13: Proc. Workshop of the 2013 Future Internet Testing-First International. 32-47","author":"Appelt Dennis","unstructured":"Dennis Appelt , Nadia Alshahwan , and Lionel C. Briand . 2013 . Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing. In FITTEST'13: Proc. Workshop of the 2013 Future Internet Testing-First International. 32-47 . Dennis Appelt, Nadia Alshahwan, and Lionel C. Briand. 2013. Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing. In FITTEST'13: Proc. Workshop of the 2013 Future Internet Testing-First International. 32-47."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610403"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2805763"},{"key":"e_1_3_2_1_4_1","article-title":"Machine Learning in Security","volume":"8","author":"Ariu Davide","year":"2015","unstructured":"Davide Ariu , Igino Corona , Roberto Tronci , and Giorgio Giacinto . 2015 . Machine Learning in Security Applications. Trans. MLDM 8 , 1 ( 2015 ), 3-39. Davide Ariu, Igino Corona, Roberto Tronci, and Giorgio Giacinto. 2015. Machine Learning in Security Applications. Trans. MLDM 8, 1 ( 2015 ), 3-39.","journal-title":"Applications. Trans. MLDM"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2991\/icence-16.2016.104"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107436"},{"key":"e_1_3_2_1_7_1","volume-title":"Vincent J. Della Pietra, Jennifer C. Lai, and Robert L. Mercer.","author":"Brown Peter F.","year":"1992","unstructured":"Peter F. Brown , Stephen Della Pietra , Vincent J. Della Pietra, Jennifer C. Lai, and Robert L. Mercer. 1992 . An Estimate of an Upper Bound for the Entropy of English. Computational Linguistics 18, 1 ( 1992 ), 31-40. Peter F. Brown, Stephen Della Pietra, Vincent J. Della Pietra, Jennifer C. Lai, and Robert L. Mercer. 1992. An Estimate of an Upper Bound for the Entropy of English. Computational Linguistics 18, 1 ( 1992 ), 31-40."},{"key":"e_1_3_2_1_8_1","volume-title":"ICCSE'16: Proc. of the 11th International Conference on Computer Science & Education. IEEE, 939-944","year":"2016","unstructured":"Chenyu, Mao, Fan, and Guo. 2016 . Defending SQL Injection Attacks basedon Intention-Oriented Detection . In ICCSE'16: Proc. of the 11th International Conference on Computer Science & Education. IEEE, 939-944 . Chenyu, Mao, Fan, and Guo. 2016. Defending SQL Injection Attacks basedon Intention-Oriented Detection. In ICCSE'16: Proc. of the 11th International Conference on Computer Science & Education. IEEE, 939-944."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.108"},{"key":"e_1_3_2_1_10_1","volume-title":"ICASSP'18: Proc. of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing.","author":"Dong Linhao","unstructured":"Linhao Dong , Shuang Xu , and Bo Xu. [n.d.]. Speech-Transformer : A NoRecurrence Sequence-to-Sequence Model for Speech Recognition . In ICASSP'18: Proc. of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing. Linhao Dong, Shuang Xu, and Bo Xu. [n.d.]. Speech-Transformer : A NoRecurrence Sequence-to-Sequence Model for Speech Recognition. In ICASSP'18: Proc. of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing."},{"key":"e_1_3_2_1_11_1","volume-title":"Machine Learning DDoS Detection for Consumer Internet of Things Devices. In SP Workshop'18: Proc. of the 2018 IEEE Security and Privacy. 29-35","author":"Doshi Rohan","year":"2018","unstructured":"Rohan Doshi , Noah Apthorpe , and Nick Feamster . 2018 . Machine Learning DDoS Detection for Consumer Internet of Things Devices. In SP Workshop'18: Proc. of the 2018 IEEE Security and Privacy. 29-35 . Rohan Doshi, Noah Apthorpe, and Nick Feamster. 2018. Machine Learning DDoS Detection for Consumer Internet of Things Devices. In SP Workshop'18: Proc. of the 2018 IEEE Security and Privacy. 29-35."},{"key":"e_1_3_2_1_12_1","volume-title":"LREC'06: Proc. of the 5th International Conference on Language Resources and Evaluation. 1222-1225","author":"Guthrie David","year":"2006","unstructured":"David Guthrie , Ben Allison , Wei Liu , Louise Guthrie , and Yorick Wilks . 2006 . A Closer Look at Skip-gram Modelling . In LREC'06: Proc. of the 5th International Conference on Language Resources and Evaluation. 1222-1225 . David Guthrie, Ben Allison, Wei Liu, Louise Guthrie, and Yorick Wilks. 2006. A Closer Look at Skip-gram Modelling. In LREC'06: Proc. of the 5th International Conference on Language Resources and Evaluation. 1222-1225."},{"key":"e_1_3_2_1_13_1","volume-title":"ICST'09: Proc. of the 2nd International Conference on Software Testing Verification and Validation. 346-355","author":"Choudhary William GJ","year":"2009","unstructured":"Halfond, William GJ , Choudhary , Shauvik Roy , Orso, and Alessandro. 2009 . Penetration testing with improved input vector identification . In ICST'09: Proc. of the 2nd International Conference on Software Testing Verification and Validation. 346-355 . Halfond, William GJ, Choudhary, Shauvik Roy, Orso, and Alessandro. 2009. Penetration testing with improved input vector identification. In ICST'09: Proc. of the 2nd International Conference on Software Testing Verification and Validation. 346-355."},{"key":"e_1_3_2_1_14_1","volume-title":"ASE'05: Proc. of the 20th IEEE\/ACM International Conference on Automated Software Engineering. 174-183","author":"William G.","unstructured":"William G. J. Halfond and Alessandro Orso. 2005. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks . In ASE'05: Proc. of the 20th IEEE\/ACM International Conference on Automated Software Engineering. 174-183 . William G. J. Halfond and Alessandro Orso. 2005. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In ASE'05: Proc. of the 20th IEEE\/ACM International Conference on Automated Software Engineering. 174-183."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181797"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70748"},{"key":"e_1_3_2_1_17_1","volume-title":"Music Transformer: Generating Music with Long-Term Structure. In ICLR'19: Proc. of the 7th International Conference on Learning Representations.","author":"Anna Huang Cheng-Zhi","year":"2019","unstructured":"Cheng-Zhi Anna Huang , Ashish Vaswani , Jakob Uszkoreit , Ian Simon , Curtis Hawthorne , Noam Shazeer , Andrew M. Dai , Matthew D. Hofman , Monica Dinculescu , and Douglas Eck . 2019 . Music Transformer: Generating Music with Long-Term Structure. In ICLR'19: Proc. of the 7th International Conference on Learning Representations. Cheng-Zhi Anna Huang, Ashish Vaswani, Jakob Uszkoreit, Ian Simon, Curtis Hawthorne, Noam Shazeer, Andrew M. Dai, Matthew D. Hofman, Monica Dinculescu, and Douglas Eck. 2019. Music Transformer: Generating Music with Long-Term Structure. In ICLR'19: Proc. of the 7th International Conference on Learning Representations."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1062"},{"key":"e_1_3_2_1_19_1","volume-title":"ICSE'09: Proc. of the 31st International Conference on Software Engineering. 199-209","author":"Kiezun Adam","unstructured":"Adam Kiezun , Philip J. Guo , Karthick Jayaraman , and Michael D. Ernst . 2009. Automatic creation of SQL Injection and cross-site scripting attacks . In ICSE'09: Proc. of the 31st International Conference on Software Engineering. 199-209 . Adam Kiezun, Philip J. Guo, Karthick Jayaraman, and Michael D. Ernst. 2009. Automatic creation of SQL Injection and cross-site scripting attacks. In ICSE'09: Proc. of the 31st International Conference on Software Engineering. 199-209."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Mi-Yeon Kim and Dong Hoon Lee. 2014. Data-mining based SQL injection attack detection using internal query trees. Expert Syst. Appl. 41 11 ( 2014 ) 5416-5430.  Mi-Yeon Kim and Dong Hoon Lee. 2014. Data-mining based SQL injection attack detection using internal query trees. Expert Syst. Appl. 41 11 ( 2014 ) 5416-5430.","DOI":"10.1016\/j.eswa.2014.02.041"},{"key":"e_1_3_2_1_21_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2015","unstructured":"Diederik P. Kingma and Jimmy Ba . 2015 . Adam : A Method for Stochastic Optimization. In ICLR'15: Proc. of the 52nd Association for Computational Linguistics . Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR'15: Proc. of the 52nd Association for Computational Linguistics."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00034"},{"key":"e_1_3_2_1_23_1","volume-title":"SQL injection signatures evasion. Imperva","author":"Maor Ofer","year":"2004","unstructured":"Ofer Maor and Amichai Shulman . 2004. SQL injection signatures evasion. Imperva , Inc., Apr ( 2004 ). Ofer Maor and Amichai Shulman. 2004. SQL injection signatures evasion. Imperva, Inc., Apr ( 2004 )."},{"key":"e_1_3_2_1_24_1","unstructured":"Stuart McDonald. 2002. SQL Injection: Modes of attack defense and why it matters. White paper GovernmentSecurity. org ( 2002 ).  Stuart McDonald. 2002. SQL Injection: Modes of attack defense and why it matters. White paper GovernmentSecurity. org ( 2002 )."},{"key":"e_1_3_2_1_25_1","volume-title":"Recurrent Models of Visual Attention. In NIPS'14: Proc. of the 2014 Neural Information Processing Systems. 2204-2212","author":"Mnih Volodymyr","year":"2014","unstructured":"Volodymyr Mnih , Nicolas Heess , Alex Graves , and Koray Kavukcuoglu . 2014 . Recurrent Models of Visual Attention. In NIPS'14: Proc. of the 2014 Neural Information Processing Systems. 2204-2212 . Volodymyr Mnih, Nicolas Heess, Alex Graves, and Koray Kavukcuoglu. 2014. Recurrent Models of Visual Attention. In NIPS'14: Proc. of the 2014 Neural Information Processing Systems. 2204-2212."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594321"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Naghmeh Moradpoor Sheykhkanloo. 2017. A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. IJCWT 7 2 ( 2017 ) 16-41.  Naghmeh Moradpoor Sheykhkanloo. 2017. A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. IJCWT 7 2 ( 2017 ) 16-41.","DOI":"10.4018\/IJCWT.2017040102"},{"key":"e_1_3_2_1_28_1","volume-title":"Beginning Ethical Hacking with Kali Linux","author":"Sinha Sanjib","unstructured":"Sanjib Sinha . 2018. SQL Mapping . In Beginning Ethical Hacking with Kali Linux . Springer , 221-258. Sanjib Sinha. 2018. SQL Mapping. In Beginning Ethical Hacking with Kali Linux. Springer, 221-258."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370428"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593833.2593835"},{"key":"e_1_3_2_1_31_1","volume-title":"Attack Model Based Penetration Test for SQL Injection Vulnerability. In COMPSAC'12: Proc. Workshops of the 36th Annual IEEE Computer Software and Applications. 589-594","author":"Tian Wei","year":"2012","unstructured":"Wei Tian , Jufeng Yang , Jing Xu , and Guannan Si . 2012 . Attack Model Based Penetration Test for SQL Injection Vulnerability. In COMPSAC'12: Proc. Workshops of the 36th Annual IEEE Computer Software and Applications. 589-594 . Wei Tian, Jufeng Yang, Jing Xu, and Guannan Si. 2012. Attack Model Based Penetration Test for SQL Injection Vulnerability. In COMPSAC'12: Proc. Workshops of the 36th Annual IEEE Computer Software and Applications. 589-594."},{"key":"e_1_3_2_1_32_1","volume-title":"NIPS'17: Proc. of the 2017 Neural Information Processing Systems. 5998-6008","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N. Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017 . Attention is All you Need . In NIPS'17: Proc. of the 2017 Neural Information Processing Systems. 5998-6008 . Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is All you Need. In NIPS'17: Proc. of the 2017 Neural Information Processing Systems. 5998-6008."},{"key":"e_1_3_2_1_33_1","volume-title":"NIPS'15: Proc. of the 2015 Neural Information Processing Systems. 2773-2781","author":"Vinyals Oriol","unstructured":"Oriol Vinyals , Lukasz Kaiser , Terry Koo , Slav Petrov , Ilya Sutskever , and Geoffrey E. Hinton . 2015. Grammar as a Foreign Language . In NIPS'15: Proc. of the 2015 Neural Information Processing Systems. 2773-2781 . Oriol Vinyals, Lukasz Kaiser, Terry Koo, Slav Petrov, Ilya Sutskever, and Geoffrey E. Hinton. 2015. Grammar as a Foreign Language. In NIPS'15: Proc. of the 2015 Neural Information Processing Systems. 2773-2781."}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397375","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:44Z","timestamp":1750199924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397375"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":33,"alternative-id":["10.1145\/3395363.3397375","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397375","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}