{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:20:33Z","timestamp":1775042433157,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,22]],"date-time":"2021-03-22T00:00:00Z","timestamp":1616371200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,22]]},"DOI":"10.1145\/3412841.3442132","type":"proceedings-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T05:09:42Z","timestamp":1619154582000},"page":"1687-1690","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["DeepTective"],"prefix":"10.1145","author":[{"given":"Rishi","family":"Rabheru","sequence":"first","affiliation":[{"name":"Imperial College London"}]},{"given":"Hazim","family":"Hanif","sequence":"additional","affiliation":[{"name":"University of Malaya, Malaysia"}]},{"given":"Sergio","family":"Maffeis","sequence":"additional","affiliation":[{"name":"Imperial College London"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Efficient and Flexible Discovery of PHP Application Vulnerabilities. In 2017 IEEE European Symposium on Security and Privacy (EuroS P).","author":"Backes M.","unstructured":"M. Backes, K. Rieck, M. Skoruppa, B. Stock, and F. Yamaguchi. 2017. Efficient and Flexible Discovery of PHP Application Vulnerabilities. In 2017 IEEE European Symposium on Security and Privacy (EuroS P)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"K. Cho B. Van Merri\u00ebnboer C. Gulcehre D. Bahdanau F. Bougares H.r Schwenk and Y. Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv:cs.CL\/1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_1_3_1","volume":"201","author":"Dahse J.","unstructured":"J. Dahse and J. Schwenk. 2010. RIPS-A static source code analyser for vulnerabilities in PHP scripts. In Seminar Work (Seminer \u00c7alismasi). Horst G\u00f6rtz Institute Ruhr-University Bochum.","journal-title":"J. Schwenk."},{"key":"e_1_3_2_1_4_1","volume-title":"d.]. progpilot. https:\/\/github.com\/designsecurity\/progpilot [Online","year":"2020","unstructured":"designsecurity. [n. d.]. progpilot. https:\/\/github.com\/designsecurity\/progpilot [Online; accessed June 05, 2020]."},{"key":"e_1_3_2_1_5_1","volume-title":"TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology. PLOS ONE 14, 11","author":"Fang Y.","year":"2019","unstructured":"Y. Fang, S. Han, C. Huang, and R. Wu. 2019. TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology. PLOS ONE 14, 11 (2019)."},{"key":"e_1_3_2_1_6_1","volume-title":"2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW).","author":"Fidalgo A.","unstructured":"A. Fidalgo, I. Medeiros, P. Antunes, and N. Neves. 2020. Towards a Deep Learning Model for Vulnerability Detection on Web Application Variants. In 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"N. Guo X. Li H. Yin and Y. Gao. 2020. VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode. In Information and Communications Security. Springer International Publishing.","DOI":"10.1007\/978-3-030-41579-2_12"},{"key":"e_1_3_2_1_8_1","volume-title":"2006 IEEE Symposium on Security and Privacy (S P'06)","author":"Jovanovic N.","unstructured":"N. Jovanovic, C. Kruegel, and E. Kirda. 2006. Pixy: a static analysis tool for detecting Web application vulnerabilities. In 2006 IEEE Symposium on Security and Privacy (S P'06)."},{"key":"e_1_3_2_1_9_1","unstructured":"T. Kipf and M. Welling. 2016. Semi-supervised classification with graph convolutional networks. (2016). arXiv:cs.CL\/1609.02907"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230856"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.31193\/ssap.isbn.9787520118873"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 23rd International Conference on World Wide Web (WWW '14)","author":"Medeiros I.","unstructured":"I. Medeiros, N. Neves, and M. Correia. 2014. Automatic Detection and Correction of Web Application Vulnerabilities Using Data Mining to Predict False Positives. In Proceedings of the 23rd International Conference on World Wide Web (WWW '14)."},{"key":"e_1_3_2_1_13_1","volume-title":"d.]. National Vulnerability Database. https:\/\/nvd.nist.gov\/ [Online","author":"National Institute of Standards and Technology. [n.","year":"2020","unstructured":"National Institute of Standards and Technology. [n. d.]. National Vulnerability Database. https:\/\/nvd.nist.gov\/ [Online; accessed April 10, 2020]."},{"key":"e_1_3_2_1_14_1","unstructured":"R. Rabheru H. Hanif and S. Maffeis. 2020. A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities. arXiv:cs.CR\/2012.08835"},{"key":"e_1_3_2_1_15_1","volume-title":"Automated Vulnerability Detection in Source Code Using Deep Representation Learning. In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).","author":"Russell R.","unstructured":"R. Russell, L. Kim, L. Hamilton, T. Lazovich, J. Harer, O. Ozdemir, P. Ellingwood, and M. McConley. 2018. Automated Vulnerability Detection in Source Code Using Deep Representation Learning. In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA)."},{"key":"e_1_3_2_1_16_1","volume-title":"d.]. phply. https:\/\/github.com\/viraptor\/phply [Online","author":"Pitucha S.","year":"2020","unstructured":"S. Pitucha. [n. d.]. phply. https:\/\/github.com\/viraptor\/phply [Online; accessed April 18, 2020]."},{"key":"e_1_3_2_1_17_1","volume-title":"d.]. LabelEncoder. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.preprocessing.LabelEncoder.html [Online","year":"2020","unstructured":"scikit-learn. [n. d.]. LabelEncoder. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.preprocessing.LabelEncoder.html [Online; accessed April 18, 2020]."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security (PLAS '11)","author":"Son S.","unstructured":"S. Son and V. Shmatikov. 2011. SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications. In Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security (PLAS '11)."},{"key":"e_1_3_2_1_19_1","volume-title":"d.]. PHP Vulnerability Test Suite. https:\/\/samate.nist.gov\/SARD\/view.php?tsID=103 [Online","author":"Stivalet B.","year":"2020","unstructured":"B. Stivalet. [n. d.]. PHP Vulnerability Test Suite. https:\/\/samate.nist.gov\/SARD\/view.php?tsID=103 [Online; accessed April 10, 2020]."}],"event":{"name":"SAC '21: The 36th ACM\/SIGAPP Symposium on Applied Computing","location":"Virtual Event Republic of Korea","acronym":"SAC '21","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 36th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442132","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412841.3442132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:01Z","timestamp":1750193221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412841.3442132"}},"subtitle":["detection of PHP vulnerabilities using hybrid graph neural networks"],"short-title":[],"issued":{"date-parts":[[2021,3,22]]},"references-count":19,"alternative-id":["10.1145\/3412841.3442132","10.1145\/3412841"],"URL":"https:\/\/doi.org\/10.1145\/3412841.3442132","relation":{},"subject":[],"published":{"date-parts":[[2021,3,22]]},"assertion":[{"value":"2021-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}