{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:49Z","timestamp":1763499049437,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485357","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2447-2449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Demo: Large Scale Analysis on Vulnerability Remediation in Open-source JavaScript Projects"],"prefix":"10.1145","author":[{"given":"Vinuri","family":"Bandara","sequence":"first","affiliation":[{"name":"SCoRe Lab, Colombo, Sri Lanka"}]},{"given":"Thisura","family":"Rathnayake","sequence":"additional","affiliation":[{"name":"SCoRe Lab, Colombo, Sri Lanka"}]},{"given":"Nipuna","family":"Weerasekara","sequence":"additional","affiliation":[{"name":"SCoRe Lab, Colombo, Sri Lanka"}]},{"given":"Charitha","family":"Elvitigala","sequence":"additional","affiliation":[{"name":"SCoRe Lab, Colombo, Sri Lanka"}]},{"given":"Kenneth","family":"Thilakarathna","sequence":"additional","affiliation":[{"name":"University of Colombo, Colombo, Sri Lanka"}]},{"given":"Primal","family":"Wijesekera","sequence":"additional","affiliation":[{"name":"University of California, Berkeley &amp; ICSI, Berkeley, CA, USA"}]},{"given":"Kasun","family":"De Zoysa","sequence":"additional","affiliation":[{"name":"University of Colombo, Colombo, Sri Lanka"}]},{"given":"Chamath","family":"Keppitiyagama","sequence":"additional","affiliation":[{"name":"University of Colombo, Colombo, Sri Lanka"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020","author":"Alomar Noura","year":"2020","unstructured":"Noura Alomar, Primal Wijesekera, Edward Qiu, and Serge Egelman. 2020. \"Youtextquoterightve Got Your Nice List of Bugs, Now What?\" Vulnerability Discovery and Management Processes in the Wild. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 319--339. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/alomar"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM51674.2020.00027"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1162666.1162671"},{"key":"e_1_3_2_1_4_1","volume-title":"The Challenges of Labeling Vulnerability-Contributing Commits. In 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 270--275","author":"Hogan Kevin","year":"2019","unstructured":"Kevin Hogan, Noel Warford, Robert Morrison, David Miller, Sean Malone, and James Purtilo. 2019. The Challenges of Labeling Vulnerability-Contributing Commits. In 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 270--275."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134072"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:00Z","timestamp":1763498820000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":6,"alternative-id":["10.1145\/3460120.3485357","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485357","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}