{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:27:21Z","timestamp":1771025241379,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Free University of Bozen-Bolzano"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1145\/3524842.3528469","type":"proceedings-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:08:36Z","timestamp":1666051716000},"page":"448-453","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["WeakSATD"],"prefix":"10.1145","author":[{"given":"Barbara","family":"Russo","sequence":"first","affiliation":[{"name":"Free University of Bozen-Bolzano, Italy"}]},{"given":"Matteo","family":"Camilli","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Italy"}]},{"given":"Moritz","family":"Mock","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901742"},{"key":"e_1_3_2_1_2_1","volume-title":"Chromium project. https:\/\/www.chromium.org\/Home. Last accessed","year":"2022","unstructured":"Chromium. 2022. Chromium project. https:\/\/www.chromium.org\/Home. Last accessed Jan. 2022 . Chromium. 2022. Chromium project. https:\/\/www.chromium.org\/Home. Last accessed Jan. 2022."},{"key":"e_1_3_2_1_3_1","unstructured":"MITRE Corporation. 2022. Federally Funded Research and Development Centers. https:\/\/www.mitre.org\/. Accessed: Jan-2022.  MITRE Corporation. 2022. Federally Funded Research and Development Centers. https:\/\/www.mitre.org\/. Accessed: Jan-2022."},{"key":"e_1_3_2_1_4_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"1999","unstructured":"Martin Fowler . 1999 . Refactoring: Improving the Design of Existing Code . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA . Martin Fowler. 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00052"},{"key":"e_1_3_2_1_6_1","unstructured":"Inc. GitHub. 2022. GitHub Actions. https:\/\/github.com\/features\/actions. Accessed: Jan-2022.  Inc. GitHub. 2022. GitHub Actions. https:\/\/github.com\/features\/actions. Accessed: Jan-2022."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196454"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00029"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.130"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183478"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC52881.2021.00034"},{"key":"e_1_3_2_1_14_1","unstructured":"Howard Michael. 2011. Security Development Lifecycle (SDL) Banned Function Calls. http:\/\/msdn.microsoft.com\/en-us\/library\/bb288454.aspx  Howard Michael. 2011. Security Development Lifecycle (SDL) Banned Function Calls. http:\/\/msdn.microsoft.com\/en-us\/library\/bb288454.aspx"},{"key":"e_1_3_2_1_15_1","unstructured":"Mozilla. 2022. Bugzilla. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1106067. Accessed: Jan-2022.  Mozilla. 2022. Bugzilla. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1106067. Accessed: Jan-2022."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241067.3241068"},{"key":"e_1_3_2_1_18_1","unstructured":"National Institute of Standards and Technology (NIST). 2022. Juliet test suite v1.3. https:\/\/samate.nist.gov\/SRD\/testsuite.php. Accessed: Jan-2022.  National Institute of Standards and Technology (NIST). 2022. Juliet test suite v1.3. https:\/\/samate.nist.gov\/SRD\/testsuite.php. Accessed: Jan-2022."},{"key":"e_1_3_2_1_19_1","unstructured":"National Institute of Standards and Technology (NIST). 2022. National Vulnerabilities Database. https:\/\/nvd.nist.gov\/. Accessed: Jan-2022.  National Institute of Standards and Technology (NIST). 2022. National Vulnerabilities Database. https:\/\/nvd.nist.gov\/. Accessed: Jan-2022."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.31"},{"key":"e_1_3_2_1_21_1","unstructured":"Aniket Potdar and Emad Shihab. 2014. List of SATD patterns. http:\/\/users.encs.concordia.ca\/~eshihab\/data\/ICSME2014\/satd.html. Accessed: Jan-2022.  Aniket Potdar and Emad Shihab. 2014. List of SATD patterns. http:\/\/users.encs.concordia.ca\/~eshihab\/data\/ICSME2014\/satd.html. Accessed: Jan-2022."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324916"},{"key":"e_1_3_2_1_23_1","unstructured":"CVE repository. 2022. Common Vulnerabilities and Enumerations (CVE). https:\/\/cve.mitre.org\/index.html. Accessed: Jan-2022.  CVE repository. 2022. Common Vulnerabilities and Enumerations (CVE). https:\/\/cve.mitre.org\/index.html. Accessed: Jan-2022."},{"key":"e_1_3_2_1_24_1","unstructured":"CWE repository. 2022. Common Weakness Enumeration (CWE). https:\/\/cwe.mitre.org\/. Accessed: Jan-2022.  CWE repository. 2022. Common Weakness Enumeration (CWE). https:\/\/cwe.mitre.org\/. Accessed: Jan-2022."},{"key":"e_1_3_2_1_25_1","unstructured":"Chromium repository. 2022. Federally Funded Research and Development Centers. https:\/\/github.com\/chromium\/chromium. Accessed: Jan-2022.  Chromium repository. 2022. Federally Funded Research and Development Centers. https:\/\/github.com\/chromium\/chromium. Accessed: Jan-2022."},{"key":"e_1_3_2_1_26_1","volume-title":"McConley","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell , Louis Kim , Lei H. Hamilton , Tomo Lazovich , Jacob A. Harer , Onur Ozdemir , Paul M. Ellingwood , and Marc W . McConley . 2018 . Automated Vulnerability Detection in Source Code Using Deep Representation Learning . arXiv:1807.04320 [cs.LG] Rebecca L. Russell, Louis Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. 2018. Automated Vulnerability Detection in Source Code Using Deep Representation Learning. arXiv:1807.04320 [cs.LG]"},{"key":"e_1_3_2_1_27_1","volume-title":"McConley","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell , Louis Kim , Lei H. Hamilton , Tomo Lazovich , Jacob A. Harer , Onur Ozdemir , Paul M. Ellingwood , and Marc W . McConley . 2018 . DRAPER VDISC dataset. https:\/\/osf.io\/d45bw\/wiki\/home\/. Accessed : Jan- 2022. Rebecca L. Russell, Louis Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. 2018. DRAPER VDISC dataset. https:\/\/osf.io\/d45bw\/wiki\/home\/. Accessed: Jan-2022."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.5569313"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00058"},{"key":"e_1_3_2_1_30_1","unstructured":"Offensive security. 2022. Exploit database. https:\/\/www.exploit-db.com\/. Accessed: Jan-2022.  Offensive security. 2022. Exploit database. https:\/\/www.exploit-db.com\/. Accessed: Jan-2022."},{"key":"e_1_3_2_1_31_1","volume-title":"9th International Conference on Information society and technology (ICIST)","volume":"2019","author":"Siavvas Miltiadis","year":"2019","unstructured":"Miltiadis Siavvas , Dimitrios Tsoukalas , Marija Jankovic , Dionysios Kehagias , Alexander Chatzigeorgiou , Dimitrios Tzovaras , Nenad Anicic , and Erol Gelenbe . 2019 . An empirical evaluation of the relationship between technical debt and software security . In 9th International Conference on Information society and technology (ICIST) , Vol. 2019 . Miltiadis Siavvas, Dimitrios Tsoukalas, Marija Jankovic, Dionysios Kehagias, Alexander Chatzigeorgiou, Dimitrios Tzovaras, Nenad Anicic, and Erol Gelenbe. 2019. An empirical evaluation of the relationship between technical debt and software security. In 9th International Conference on Information society and technology (ICIST), Vol. 2019."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.02.056"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2630503"},{"key":"e_1_3_2_1_34_1","unstructured":"Cunningham Ward. 2009. Ward explains Debt Metaphor. wiki.c2.com\/?WardExplainsDebtMetaphor  Cunningham Ward. 2009. Ward explains Debt Metaphor. wiki.c2.com\/?WardExplainsDebtMetaphor"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.72"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3031401"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196423"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985362.1985366"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2942930"}],"event":{"name":"MSR '22: 19th International Conference on Mining Software Repositories","location":"Pittsburgh Pennsylvania","acronym":"MSR '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 19th International Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524842.3528469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3524842.3528469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:35Z","timestamp":1750183775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3524842.3528469"}},"subtitle":["detecting weak self-admitted technical debt"],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":39,"alternative-id":["10.1145\/3524842.3528469","10.1145\/3524842"],"URL":"https:\/\/doi.org\/10.1145\/3524842.3528469","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}