{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:24:25Z","timestamp":1755926665265,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3527284","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"1219-1221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Base64 Malleability in Practice"],"prefix":"10.1145","author":[{"given":"Konstantinos","family":"Chalkias","sequence":"first","affiliation":[{"name":"Meta, Menlo Park, CA, USA"}]},{"given":"Panagiotis","family":"Chatzigiannis","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. Request for Comments: 4880. https:\/\/datatracker.ietf.org\/doc\/html\/rfc4880  J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. Request for Comments: 4880. https:\/\/datatracker.ietf.org\/doc\/html\/rfc4880"},{"key":"e_1_3_2_2_2_1","volume-title":"Francc ois Garillot, and Valeria Nikolaenko","author":"Chalkias Konstantinos","year":"2020","unstructured":"Konstantinos Chalkias , Francc ois Garillot, and Valeria Nikolaenko . 2020 . Taming the Many EdDSAs. In Security Standardisation Research . Konstantinos Chalkias, Francc ois Garillot, and Valeria Nikolaenko. 2020. Taming the Many EdDSAs. In Security Standardisation Research."},{"key":"e_1_3_2_2_3_1","unstructured":"M. Crispin. 2003. Request for Comments: 3501. https:\/\/datatracker.ietf.org\/doc\/html\/rfc3501#section-5.1.3  M. Crispin. 2003. Request for Comments: 3501. https:\/\/datatracker.ietf.org\/doc\/html\/rfc3501#section-5.1.3"},{"key":"e_1_3_2_2_4_1","unstructured":"Kevin Fiscus. 2011. Base64 Can Get You Pwned. https:\/\/www.sans.org\/white-papers\/33759\/  Kevin Fiscus. 2011. Base64 Can Get You Pwned. https:\/\/www.sans.org\/white-papers\/33759\/"},{"key":"e_1_3_2_2_5_1","unstructured":"N. Freed and N. Borenstein. 1996. Request for Comments: 2045. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2045#page-24  N. Freed and N. Borenstein. 1996. Request for Comments: 2045. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2045#page-24"},{"key":"e_1_3_2_2_6_1","unstructured":"D. Goldsmith and M. Davis. 1997. Request for Comments: 2152. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2152  D. Goldsmith and M. Davis. 1997. Request for Comments: 2152. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2152"},{"key":"e_1_3_2_2_7_1","unstructured":"S. Josefsson. 2006. Request for Comments: 4648. https:\/\/datatracker.ietf.org\/doc\/html\/rfc4648#section-3.5  S. Josefsson. 2006. Request for Comments: 4648. https:\/\/datatracker.ietf.org\/doc\/html\/rfc4648#section-3.5"},{"key":"e_1_3_2_2_8_1","volume-title":"PKCS, and CMS structures. Internet Engineering Task Force April","author":"Josefsson Simon","year":"2015","unstructured":"Simon Josefsson and Sean Leonard . 2015. Textual encodings of PKIX , PKCS, and CMS structures. Internet Engineering Task Force April ( 2015 ). Simon Josefsson and Sean Leonard. 2015. Textual encodings of PKIX, PKCS, and CMS structures. Internet Engineering Task Force April (2015)."},{"volume-title":"3rd time that I find a serious exploitable bug in a multi-million business website. https:\/\/www.linkedin.com\/posts\/chalkiaskostas_programming-python-databases-activity-6820220132233748480--8teK","author":"Kryptos Kostas","key":"e_1_3_2_2_9_1","unstructured":"Kostas Kryptos . 2021. 3rd time that I find a serious exploitable bug in a multi-million business website. https:\/\/www.linkedin.com\/posts\/chalkiaskostas_programming-python-databases-activity-6820220132233748480--8teK Kostas Kryptos. 2021. 3rd time that I find a serious exploitable bug in a multi-million business website. https:\/\/www.linkedin.com\/posts\/chalkiaskostas_programming-python-databases-activity-6820220132233748480--8teK"},{"key":"e_1_3_2_2_10_1","unstructured":"J. Linn. 199"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Ajeet Ram Pathak Sarita Deshpande and Mudra Panchal. 2019. A Secure Framework for File Encryption Using Base64 Encoding. In Computing and Network Sustainability Sheng-Lung Peng Nilanjan Dey and Mahesh Bundele (Eds.).  Ajeet Ram Pathak Sarita Deshpande and Mudra Panchal. 2019. A Secure Framework for File Encryption Using Base64 Encoding. In Computing and Network Sustainability Sheng-Lung Peng Nilanjan Dey and Mahesh Bundele (Eds.).","DOI":"10.1007\/978-981-13-7150-9_38"},{"volume-title":"Base64 URL Encoding","author":"Siriwardena Prabath","key":"e_1_3_2_2_12_1","unstructured":"Prabath Siriwardena . 2020. Base64 URL Encoding . Apress , Berkeley, CA , 397--399. Prabath Siriwardena. 2020. Base64 URL Encoding .Apress, Berkeley, CA, 397--399."},{"key":"e_1_3_2_2_13_1","unstructured":"Daniel Smallwood. 2021. Hacker Pig Latin: A Base64 Primer for Security Analysts. https:\/\/www.darkreading.com\/edge-articles\/hacker-pig-latin-a-base64-primer-for-security-analysts  Daniel Smallwood. 2021. Hacker Pig Latin: A Base64 Primer for Security Analysts. https:\/\/www.darkreading.com\/edge-articles\/hacker-pig-latin-a-base64-primer-for-security-analysts"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Wen Somchai and Dang Wen. 2018. Research on Base64 Encoding Algorithm and PHP Implementation. In Geoinformatics.  Wen Somchai and Dang Wen. 2018. Research on Base64 Encoding Algorithm and PHP Implementation. In Geoinformatics.","DOI":"10.1109\/GEOINFORMATICS.2018.8557068"},{"key":"e_1_3_2_2_15_1","volume-title":"Edmond Febrinicko Armay, and Robbi Rahim.","author":"Wibowo Mars Caroline","year":"2020","unstructured":"Mars Caroline Wibowo , Phong Thanh Nguyen , Edmond Febrinicko Armay, and Robbi Rahim. 2020 . Implementation of Base 64 and caesar cipher in securing video files., Vol. 12 , 2 (2020), 761--765. https:\/\/doi.org\/10.5373\/JARDCS\/V12I2\/S20201093 10.5373\/JARDCS Mars Caroline Wibowo, Phong Thanh Nguyen, Edmond Febrinicko Armay, and Robbi Rahim. 2020. Implementation of Base64 and caesar cipher in securing video files., Vol. 12, 2 (2020), 761--765. https:\/\/doi.org\/10.5373\/JARDCS\/V12I2\/S20201093"}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3527284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3527284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":15,"alternative-id":["10.1145\/3488932.3527284","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3527284","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}