{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:37:20Z","timestamp":1770295040780,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598116","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"1043-1054","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Splendor: Static Detection of Stored XSS in Modern Web Applications"],"prefix":"10.1145","author":[{"given":"He","family":"Su","sequence":"first","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Lili","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Wenbo","family":"Hu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Yujie","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Qing","family":"Sun","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Huina","family":"Chao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]},{"given":"Wei","family":"Huo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering at Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Awesome CMS. https:\/\/github.com\/postlight\/awesome-cms. \t\t\t\t  Awesome CMS. https:\/\/github.com\/postlight\/awesome-cms."},{"key":"e_1_3_2_1_2_1","unstructured":"Catfish. https:\/\/github.com\/xwlrbh\/Catfish. \t\t\t\t  Catfish. https:\/\/github.com\/xwlrbh\/Catfish."},{"key":"e_1_3_2_1_3_1","unstructured":"Data Access Layer. https:\/\/en.wikipedia.org\/wiki\/Data_access_layer. \t\t\t\t  Data Access Layer. https:\/\/en.wikipedia.org\/wiki\/Data_access_layer."},{"key":"e_1_3_2_1_4_1","unstructured":"Gremlin. https:\/\/tinkerpop.apache.org\/gremlin.html. \t\t\t\t  Gremlin. https:\/\/tinkerpop.apache.org\/gremlin.html."},{"key":"e_1_3_2_1_5_1","unstructured":"How to use Method Chaining in PHP. https:\/\/programmingdive.com\/how-to-use-method-chaining-in-php\/. \t\t\t\t  How to use Method Chaining in PHP. https:\/\/programmingdive.com\/how-to-use-method-chaining-in-php\/."},{"key":"e_1_3_2_1_6_1","unstructured":"MySQL Documentation. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/string-types.html. \t\t\t\t  MySQL Documentation. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/string-types.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Neo4j. http:\/\/www.neo4j.com. \t\t\t\t  Neo4j. http:\/\/www.neo4j.com."},{"key":"e_1_3_2_1_8_1","unstructured":"osCommerce. https:\/\/www.oscommerce.com\/. \t\t\t\t  osCommerce. https:\/\/www.oscommerce.com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"PHP built-in functions. https:\/\/www.php.net\/manual\/en\/indexes.functions.php. \t\t\t\t  PHP built-in functions. https:\/\/www.php.net\/manual\/en\/indexes.functions.php."},{"key":"e_1_3_2_1_10_1","unstructured":"PunBB. https:\/\/punbb.informer.com\/. \t\t\t\t  PunBB. https:\/\/punbb.informer.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"SPLENDOR\u2019s data. https:\/\/github.com\/splendor-pro\/data. \t\t\t\t  SPLENDOR\u2019s data. https:\/\/github.com\/splendor-pro\/data."},{"key":"e_1_3_2_1_12_1","unstructured":"SPLENDOR\u2019s source code. https:\/\/github.com\/splendor-pro\/splendor. \t\t\t\t  SPLENDOR\u2019s source code. https:\/\/github.com\/splendor-pro\/splendor."},{"key":"e_1_3_2_1_13_1","unstructured":"ThinkPHP. https:\/\/github.com\/top-think. \t\t\t\t  ThinkPHP. https:\/\/github.com\/top-think."},{"key":"e_1_3_2_1_14_1","unstructured":"Usage statistics of content management systems. https:\/\/w3techs.com\/technologies\/overview\/content_management. \t\t\t\t  Usage statistics of content management systems. https:\/\/w3techs.com\/technologies\/overview\/content_management."},{"key":"e_1_3_2_1_15_1","unstructured":"Usage statistics of server-side programming languages for websites. https:\/\/w3techs.com\/technologies\/overview\/programming_language. \t\t\t\t  Usage statistics of server-side programming languages for websites. https:\/\/w3techs.com\/technologies\/overview\/programming_language."},{"key":"e_1_3_2_1_16_1","unstructured":"WP Google Review Slider. https:\/\/wordpress.org\/plugins\/wp-google-places-review-slider\/. \t\t\t\t  WP Google Review Slider. https:\/\/wordpress.org\/plugins\/wp-google-places-review-slider\/."},{"key":"e_1_3_2_1_17_1","first-page":"392","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Alhuzali A.","year":"2018","unstructured":"Alhuzali , A. , Gjomemo , R. , Eshete , B. , and Venkatakrishnan , V . NAVEX: Precise and scalable exploit generation for dynamic web applications . In 27th USENIX Security Symposium (USENIX Security 18) ( 2018 ), pp. 377\u2013 392 . Alhuzali, A., Gjomemo, R., Eshete, B., and Venkatakrishnan, V. NAVEX: Precise and scalable exploit generation for dynamic web applications. In 27th USENIX Security Symposium (USENIX Security 18) (2018), pp. 377\u2013392."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Anagandula K. and Zavarsky P. An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities. In 2020 3rd International Conference on Data Intelligence and Security (ICDIS) (2020) pp. 40\u201348. \t\t\t\t  Anagandula K. and Zavarsky P. An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities. In 2020 3rd International Conference on Data Intelligence and Security (ICDIS) (2020) pp. 40\u201348.","DOI":"10.1109\/ICDIS50059.2020.00012"},{"key":"e_1_3_2_1_19_1","first-page":"271","volume-title":"20th Working Conference on Reverse Engineering, WCRE 2013","author":"Avancini A.","year":"2013","unstructured":"Avancini , A. , and Ceccato , M . Circe: A grammar-based oracle for testing cross-site scripting in web applications . In 20th Working Conference on Reverse Engineering, WCRE 2013 , Koblenz, Germany , October 14-17, 2013 (2013), R. L\u00e4mmel, R. Oliveto, and R. Robbes, Eds., IEEE Computer Society, pp. 262\u2013 271 . Avancini, A., and Ceccato, M. Circe: A grammar-based oracle for testing cross-site scripting in web applications. In 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, October 14-17, 2013 (2013), R. L\u00e4mmel, R. Oliveto, and R. Robbes, Eds., IEEE Computer Society, pp. 262\u2013271."},{"key":"e_1_3_2_1_20_1","first-page":"349","volume-title":"2017 IEEE European Symposium on Security and Privacy","author":"Backes M.","year":"2017","unstructured":"Backes , M. , Rieck , K. , Skoruppa , M. , Stock , B. , and Yamaguchi , F . Efficient and flexible discovery of PHP application vulnerabilities . In 2017 IEEE European Symposium on Security and Privacy ( 2017 ), pp. 334\u2013 349 . Backes, M., Rieck, K., Skoruppa, M., Stock, B., and Yamaguchi, F. Efficient and flexible discovery of PHP application vulnerabilities. In 2017 IEEE European Symposium on Security and Privacy (2017), pp. 334\u2013349."},{"key":"e_1_3_2_1_21_1","volume-title":"2010 International Conference for Internet Technology and Secured Transactions","author":"Castro E.","year":"2010","unstructured":"Castro , E. , Alcaide , A. , Orfila , A. , and Al\u00eds , J. B . A multi-agent scanner to detect stored-XSS vulnerabilities . 2010 International Conference for Internet Technology and Secured Transactions ( 2010 ), 1\u20136. Castro, E., Alcaide, A., Orfila, A., and Al\u00eds, J. B. A multi-agent scanner to detect stored-XSS vulnerabilities. 2010 International Conference for Internet Technology and Secured Transactions (2010), 1\u20136."},{"key":"e_1_3_2_1_22_1","volume-title":"21st Annual Network and Distributed System Security Symposium, NDSS 2014","author":"Dahse J.","year":"2014","unstructured":"Dahse , J. , and Holz , T . Simulation of built-in PHP features for precise static code analysis . In 21st Annual Network and Distributed System Security Symposium, NDSS 2014 , San Diego, California, USA , February 23-26, 2014 (2014). Dahse, J., and Holz, T. Simulation of built-in PHP features for precise static code analysis. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014 (2014)."},{"key":"e_1_3_2_1_23_1","first-page":"1003","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Dahse J.","year":"2014","unstructured":"Dahse , J. , and Holz , T . Static Detection of Second-Order Vulnerabilities in Web Applications . In Proceedings of the 23rd USENIX Security Symposium , San Diego, CA, USA , August 20-22, 2014 (2014), K. Fu and J. Jung, Eds., pp. 989\u2013 1003 . Dahse, J., and Holz, T. Static Detection of Second-Order Vulnerabilities in Web Applications. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014 (2014), K. Fu and J. Jung, Eds., pp. 989\u20131003."},{"key":"e_1_3_2_1_24_1","first-page":"1142","volume-title":"Black Widow: Blackbox Data-driven Web Scanning","author":"Eriksson B.","unstructured":"Eriksson , B. , Pellegrino , G. , and Sabelfeld , A . Black Widow: Blackbox Data-driven Web Scanning . pp. 1125\u2013 1142 . Eriksson, B., Pellegrino, G., and Sabelfeld, A. Black Widow: Blackbox Data-driven Web Scanning. pp. 1125\u20131142."},{"key":"e_1_3_2_1_25_1","volume-title":"DeepXSS: Cross Site Scripting Detection Based on Deep Learning. In International Conference on Computing and Artificial Intelligence","author":"Fang Y.","year":"2018","unstructured":"Fang , Y. , Li , Y. , Liu , L. , and Huang , C . DeepXSS: Cross Site Scripting Detection Based on Deep Learning. In International Conference on Computing and Artificial Intelligence ( 2018 ). Fang, Y., Li, Y., Liu, L., and Huang, C. DeepXSS: Cross Site Scripting Detection Based on Deep Learning. In International Conference on Computing and Artificial Intelligence (2018)."},{"key":"e_1_3_2_1_26_1","first-page":"6","volume-title":"2015 Annual IEEE India Conference (INDICON)","author":"Gupta M. K.","year":"2015","unstructured":"Gupta , M. K. , Govil , M. C. , and Singh , G . Text-mining based predictive model to detect XSS vulnerable files in web applications . In 2015 Annual IEEE India Conference (INDICON) ( 2015 ), pp. 1\u2013 6 . Gupta, M. K., Govil, M. C., and Singh, G. Text-mining based predictive model to detect XSS vulnerable files in web applications. In 2015 Annual IEEE India Conference (INDICON) (2015), pp. 1\u20136."},{"key":"e_1_3_2_1_27_1","volume-title":"Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey. ArXiv abs\/2205.08425","author":"Hannousse A.","year":"2022","unstructured":"Hannousse , A. , Yahiouche , S. , and Nait-Hamoud , M. C. Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey. ArXiv abs\/2205.08425 ( 2022 ). Hannousse, A., Yahiouche, S., and Nait-Hamoud, M. C. Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey. ArXiv abs\/2205.08425 (2022)."},{"key":"e_1_3_2_1_28_1","first-page":"788","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security","author":"Heiderich M.","year":"2013","unstructured":"Heiderich , M. , Schwenk , J. , Frosch , T. , Magazinius , J. , and Yang , E. Z . MXSS Attacks: Attacking Well-Secured Web-Applications by Using InnerHTML Mutations . In Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security ( New York, NY, USA , 2013 ), CCS \u201913, Association for Computing Machinery, pp. 777\u2013 788 . Heiderich, M., Schwenk, J., Frosch, T., Magazinius, J., and Yang, E. Z. MXSS Attacks: Attacking Well-Secured Web-Applications by Using InnerHTML Mutations. In Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security (New York, NY, USA, 2013), CCS \u201913, Association for Computing Machinery, pp. 777\u2013788."},{"key":"e_1_3_2_1_29_1","first-page":"263","volume-title":"2006 IEEE Symposium on Security and Privacy (S&P\u201906)","author":"Jovanovic N.","year":"2006","unstructured":"Jovanovic , N. , Kr\u00fcgel , C. , and Kirda , E . Pixy: a static analysis tool for detecting web application vulnerabilities . 2006 IEEE Symposium on Security and Privacy (S&P\u201906) ( 2006 ), 6 pp.\u2013 263 . Jovanovic, N., Kr\u00fcgel, C., and Kirda, E. Pixy: a static analysis tool for detecting web application vulnerabilities. 2006 IEEE Symposium on Security and Privacy (S&P\u201906) (2006), 6 pp.\u2013263."},{"key":"e_1_3_2_1_30_1","volume-title":"Server Side Method to Detect and Prevent Stored XSS Attack","author":"Khazal I. F.","unstructured":"Khazal , I. F. , and Hussain , M. A . Server Side Method to Detect and Prevent Stored XSS Attack . vol. 17 . Khazal, I. F., and Hussain, M. A. Server Side Method to Detect and Prevent Stored XSS Attack. vol. 17."},{"key":"e_1_3_2_1_31_1","first-page":"14","volume":"10","author":"Li C.","year":"2020","unstructured":"Li , C. , Wang , Y. , Miao , C. , and Huang , C . Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining. Applied Sciences 10 , 14 ( 2020 ). Li, C., Wang, Y., Miao, C., and Huang, C. Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining. Applied Sciences 10, 14 (2020).","journal-title":"Applied Sciences"},{"key":"e_1_3_2_1_32_1","first-page":"672","volume-title":"Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015","author":"Li D.","year":"2015","unstructured":"Li , D. , Lyu , Y. , Wan , M. , and Halfond , W. G. J. String analysis for Java and Android applications . In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015 , Bergamo, Italy, August 30 - September 4, 2015 (2015), ACM, pp. 661\u2013 672 . Li, D., Lyu, Y., Wan, M., and Halfond, W. G. J. String analysis for Java and Android applications. In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2015, Bergamo, Italy, August 30 - September 4, 2015 (2015), ACM, pp. 661\u2013672."},{"key":"e_1_3_2_1_33_1","first-page":"2188","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","author":"Luo C.","year":"2022","unstructured":"Luo , C. , Li , P. , and Meng , W . TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications . In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ( 2022 ), CCS \u201922, pp. 2175\u2013 2188 . Luo, C., Li, P., and Meng, W. TChecker: Precise Static Inter-Procedural Analysis for Detecting Taint-Style Vulnerabilities in PHP Applications. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), CCS \u201922, pp. 2175\u20132188."},{"key":"e_1_3_2_1_34_1","first-page":"69","volume-title":"26th Asia-Pacific Software Engineering Conference, APSEC 2019","author":"Lv C.","year":"2019","unstructured":"Lv , C. , Zhang , L. , Zeng , F. , and Zhang , J . Adaptive random testing for XSS vulnerability . In 26th Asia-Pacific Software Engineering Conference, APSEC 2019 , Putrajaya, Malaysia , December 2-5, 2019 (2019), IEEE, pp. 63\u2013 69 . Lv, C., Zhang, L., Zeng, F., and Zhang, J. Adaptive random testing for XSS vulnerability. In 26th Asia-Pacific Software Engineering Conference, APSEC 2019, Putrajaya, Malaysia, December 2-5, 2019 (2019), IEEE, pp. 63\u201369."},{"key":"e_1_3_2_1_35_1","volume-title":"International Symposium on Recent Advances in Intrusion Detection","author":"McAllister S.","year":"2008","unstructured":"McAllister , S. , Kirda , E. , and Kr\u00fcgel , C . Leveraging user interactions for in-depth testing of web applications . In International Symposium on Recent Advances in Intrusion Detection ( 2008 ). McAllister, S., Kirda, E., and Kr\u00fcgel, C. Leveraging user interactions for in-depth testing of web applications. In International Symposium on Recent Advances in Intrusion Detection (2008)."},{"key":"e_1_3_2_1_36_1","first-page":"373","volume-title":"2017 IEEE International Conference on Software Quality, Reliability and Security (QRS)","author":"Mohammadi M.","year":"2017","unstructured":"Mohammadi , M. , Chu , B. , and Lipford , H. R . Detecting cross-site scripting vulnerabilities through automated unit testing . In 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) ( 2017 ), pp. 364\u2013 373 . Mohammadi, M., Chu, B., and Lipford, H. R. Detecting cross-site scripting vulnerabilities through automated unit testing. In 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) (2017), pp. 364\u2013373."},{"key":"e_1_3_2_1_37_1","first-page":"628","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"Olivo O.","year":"2015","unstructured":"Olivo , O. , Dillig , I. , and Lin , C . Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , Denver, CO, USA , October 12-16, 2015 (2015), I. Ray, N. Li, and C. Kruegel, Eds., ACM, pp. 616\u2013 628 . Olivo, O., Dillig, I., and Lin, C. Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015 (2015), I. Ray, N. Li, and C. Kruegel, Eds., ACM, pp. 616\u2013628."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2011.0084"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.04.002"},{"key":"e_1_3_2_1_40_1","first-page":"365","volume-title":"2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)","author":"Su H.","year":"2022","unstructured":"Su , H. , Xu , L. , Chao , H. , Li , F. , Yuan , Z. , Zhou , J. , and Huo , W . A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs . In 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE) ( 2022 ), pp. 355\u2013 365 . Su, H., Xu, L., Chao, H., Li, F., Yuan, Z., Zhou, J., and Huo, W. A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs. In 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE) (2022), pp. 355\u2013365."},{"key":"e_1_3_2_1_41_1","volume-title":"International Conferences on Information Science and System","author":"Vernotte A.","year":"2014","unstructured":"Vernotte , A. , Dadeau , F. , Lebeau , F. , Legeard , B. , Peureux , F. , and Piat , F . Efficient detection of multi-step cross-site scripting vulnerabilities . In International Conferences on Information Science and System ( 2014 ). Vernotte, A., Dadeau, F., Lebeau, F., Legeard, B., Peureux, F., and Piat, F. Efficient detection of multi-step cross-site scripting vulnerabilities. In International Conferences on Information Science and System (2014)."},{"key":"e_1_3_2_1_42_1","first-page":"194","volume-title":"Program Slicing Stored XSS Bugs in Web Application. In 2011 Fifth International Conference on Theoretical Aspects of Software Engineering","author":"Wang Y.","year":"2011","unstructured":"Wang , Y. , Li , Z. , and Guo , T . Program Slicing Stored XSS Bugs in Web Application. In 2011 Fifth International Conference on Theoretical Aspects of Software Engineering ( 2011 ), pp. 191\u2013 194 . Wang, Y., Li, Z., and Guo, T. Program Slicing Stored XSS Bugs in Web Application. In 2011 Fifth International Conference on Theoretical Aspects of Software Engineering (2011), pp. 191\u2013194."},{"key":"e_1_3_2_1_43_1","first-page":"604","volume-title":"2014 IEEE Symposium on Security and Privacy (May","author":"Yamaguchi F.","year":"2014","unstructured":"Yamaguchi , F. , Golde , N. , Arp , D. , and Rieck , K . Modeling and discovering vulnerabilities with code property graphs . In 2014 IEEE Symposium on Security and Privacy (May 2014 ), pp. 590\u2013 604 . Yamaguchi, F., Golde, N., Arp, D., and Rieck, K. Modeling and discovering vulnerabilities with code property graphs. In 2014 IEEE Symposium on Security and Privacy (May 2014), pp. 590\u2013604."}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":43,"alternative-id":["10.1145\/3597926.3598116","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598116","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}