{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:56:00Z","timestamp":1772042160012,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3468594","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:44:18Z","timestamp":1629337458000},"page":"842-854","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Understanding and detecting server-side request races in web applications"],"prefix":"10.1145","author":[{"given":"Zhengyi","family":"Qiu","sequence":"first","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Shudi","family":"Shao","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Qi","family":"Zhao","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Guoliang","family":"Jin","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Bugzilla. https:\/\/github.com\/bugzilla\/bugzilla  [n.d.]. Bugzilla. https:\/\/github.com\/bugzilla\/bugzilla"},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html  [n.d.]. Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Discourse. https:\/\/github.com\/discourse\/discourse  [n.d.]. Discourse. https:\/\/github.com\/discourse\/discourse"},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. DNN howpublished = \". https:\/\/github.com\/dnnsoftware\/Dnn.Platform  [n.d.]. DNN howpublished = \". https:\/\/github.com\/dnnsoftware\/Dnn.Platform"},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Drupal. https:\/\/git.drupalcode.org\/project\/drupal  [n.d.]. Drupal. https:\/\/git.drupalcode.org\/project\/drupal"},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Gitlab. https:\/\/about.gitlab.com  [n.d.]. Gitlab. https:\/\/about.gitlab.com"},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. GoReplay - test your system with real data. https:\/\/goreplay.org\/  [n.d.]. GoReplay - test your system with real data. https:\/\/goreplay.org\/"},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. MediaWiki. https:\/\/github.com\/wikimedia\/mediawiki  [n.d.]. MediaWiki. https:\/\/github.com\/wikimedia\/mediawiki"},{"key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. Moodle. https:\/\/github.com\/moodle\/moodle  [n.d.]. Moodle. https:\/\/github.com\/moodle\/moodle"},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Multi-Processing Modules (MPMs) - Apache HTTP Server Version 2.4. https:\/\/httpd.apache.org\/docs\/2.4\/mpm.html  [n.d.]. Multi-Processing Modules (MPMs) - Apache HTTP Server Version 2.4. https:\/\/httpd.apache.org\/docs\/2.4\/mpm.html"},{"key":"e_1_3_2_1_11_1","unstructured":"[n.d.]. MySQL 8.0 Reference Manual: 16.2 The MyISAM Storage Engine. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/myisam-storage-engine.html  [n.d.]. MySQL 8.0 Reference Manual: 16.2 The MyISAM Storage Engine. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/myisam-storage-engine.html"},{"key":"e_1_3_2_1_12_1","unstructured":"[n.d.]. Odoo. https:\/\/github.com\/odoo\/odoo  [n.d.]. Odoo. https:\/\/github.com\/odoo\/odoo"},{"key":"e_1_3_2_1_13_1","unstructured":"[n.d.]. OpenMRS. https:\/\/github.com\/openmrs\/openmrs-core  [n.d.]. OpenMRS. https:\/\/github.com\/openmrs\/openmrs-core"},{"key":"e_1_3_2_1_14_1","unstructured":"[n.d.]. Redmine. https:\/\/www.redmine.org\/  [n.d.]. Redmine. https:\/\/www.redmine.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"[n.d.]. Spree. https:\/\/github.com\/spree\/spree  [n.d.]. Spree. https:\/\/github.com\/spree\/spree"},{"key":"e_1_3_2_1_16_1","unstructured":"[n.d.]. WordPress Trac. https:\/\/core.trac.wordpress.org\/browser\/trunk  [n.d.]. WordPress Trac. https:\/\/core.trac.wordpress.org\/browser\/trunk"},{"key":"e_1_3_2_1_17_1","unstructured":"Aaron Hnatiw Security Compass. [n.d.]. Moving Beyond The OWASP Top 10 Part 1: Race Conditions. https:\/\/resources.securitycompass.com\/blog\/moving-beyond-the-owasp-top-10-part-1-race-conditions-2  Aaron Hnatiw Security Compass. [n.d.]. Moving Beyond The OWASP Top 10 Part 1: Race Conditions. https:\/\/resources.securitycompass.com\/blog\/moving-beyond-the-owasp-top-10-part-1-race-conditions-2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133890"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.31"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451128"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541973"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092734"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814303"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062364"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"e_1_3_2_1_26_1","unstructured":"Jack Cable. [n.d.]. Race Condition in Redeeming Coupons. https:\/\/hackerone.com\/reports\/157996  Jack Cable. [n.d.]. Race Condition in Redeeming Coupons. https:\/\/hackerone.com\/reports\/157996"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043567"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522725"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201914)","author":"Chen Haogang","year":"1971","unstructured":"Haogang Chen , Taesoo Kim , Xi Wang , Nickolai Zeldovich , and M. Frans Kaashoek . 2014. Identifying Information Disclosure in Web Applications with Retroactive Auditing . In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201914) . USENIX Association, Berkeley, CA, USA. 555\u2013569. isbn:978-1-93 1971 -16-4 http:\/\/dl.acm.org\/citation.cfm?id=2685048.2685092 Haogang Chen, Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. 2014. Identifying Information Disclosure in Web Applications with Retroactive Auditing. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201914). USENIX Association, Berkeley, CA, USA. 555\u2013569. isbn:978-1-931971-16-4 http:\/\/dl.acm.org\/citation.cfm?id=2685048.2685092"},{"key":"e_1_3_2_1_30_1","unstructured":"Lucian Constantin. [n.d.]. Withdrawal vulnerabilities enabled bitcoin theft from Flexcoin and Poloniex. https:\/\/www.pcworld.com\/article\/2104940\/withdrawal-vulnerabilities-enabled-bitcoin-theft-from-flexcoin-and-poloniex.html  Lucian Constantin. [n.d.]. Withdrawal vulnerabilities enabled bitcoin theft from Flexcoin and Poloniex. https:\/\/www.pcworld.com\/article\/2104940\/withdrawal-vulnerabilities-enabled-bitcoin-theft-from-flexcoin-and-poloniex.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064188"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273484"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544315"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_40"},{"key":"e_1_3_2_1_36_1","unstructured":"Egor Homakov. [n.d.]. Hacking Starbucks for unlimited coffee. https:\/\/sakurity.com\/blog\/2015\/05\/21\/starbucks.html  Egor Homakov. [n.d.]. Hacking Starbucks for unlimited coffee. https:\/\/sakurity.com\/blog\/2015\/05\/21\/starbucks.html"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594330"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173173"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594315"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814282"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993544"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869481"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387902"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387899"},{"key":"e_1_3_2_1_45_1","volume-title":"Raccoon: Automated Verification of Guarded Race Conditions in Web Applications. ACM. isbn:9781450368667","author":"Koch Simon","year":"2020","unstructured":"Simon Koch , Tim Sauer , Martin Johns , and Giancarlo Pellegrino . 2020 . Raccoon: Automated Verification of Guarded Race Conditions in Web Applications. ACM. isbn:9781450368667 Simon Koch, Tim Sauer, Martin Johns, and Giancarlo Pellegrino. 2020. Raccoon: Automated Verification of Guarded Race Conditions in Web Applications. ACM. isbn:9781450368667"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811057"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043589"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872374"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359638"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037735"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177161"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635881"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337259"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Jie Lu Feng Li Lian Li and Xiaobing Feng. 2018. CloudRaid: Hunting Concurrency Bugs in the Cloud via Log-Mining. ACM. isbn:9781450355735  Jie Lu Feng Li Lian Li and Xiaobing Feng. 2018. CloudRaid: Hunting Concurrency Bugs in the Cloud via Log-Mining. ACM. isbn:9781450355735","DOI":"10.1145\/3236024.3236071"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993543"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594311"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786820"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693098"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-018-0246-5"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_7"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254095"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509538"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786836"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337257"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375584"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00016"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132760"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985824"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155628"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180194"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568294"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180171"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.33"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950395"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736041"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00033"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337292"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:51Z","timestamp":1750195491000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468594"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":80,"alternative-id":["10.1145\/3468264.3468594","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3468594","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}