{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T18:03:33Z","timestamp":1777658613495,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,17]]},"DOI":"10.1145\/3727967.3756838","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T11:53:17Z","timestamp":1766490797000},"page":"162-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Systematic Literature Review on Static Application Security Testing (SAST) Tools: Evaluation, Benchmarks, Challenges, and Future Directions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5670-484X","authenticated-orcid":false,"given":"Doaa","family":"Dalaq","sequence":"first","affiliation":[{"name":"Information and Computer Science department, King Fahd University of Petroleum and Mineral, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8582-4433","authenticated-orcid":false,"given":"Kaniz Fatima","family":"Daya","sequence":"additional","affiliation":[{"name":"Information and Computer Science department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6819-1069","authenticated-orcid":false,"given":"Alaa","family":"Dalaq","sequence":"additional","affiliation":[{"name":"Information and Computer Science department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9869-3981","authenticated-orcid":false,"given":"Muhammed Nazmul","family":"Arefin","sequence":"additional","affiliation":[{"name":"Information and Computer Science department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7318-7644","authenticated-orcid":false,"given":"Mahmood Khan","family":"Niazi","sequence":"additional","affiliation":[{"name":"Information and Computer Science department, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2025,12,23]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Accessed","year":"2025","unstructured":"\u201cIEEE Xplore Full-Text PDF:\u201d Accessed: Feb. 28, 2025. [Online]. Available: https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&arnumber=10833895&tag=1"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/S23187978"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.32604\/CMC.2020.010885"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/S10664-022-10179-6\/TABLES\/16"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3475716.3475781"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3354789"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.24"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3544416"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.JSS.2019.110427"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533767"},{"key":"e_1_3_3_1_11_2","volume-title":"Accessed","author":"V\u00e1ndor N.","year":"2025","unstructured":"[11] N. V\u00e1ndor, B. Mosolyg\u00f3, and P. Heged\u02dd, \u201cComparing ML-Based Predictions and Static Analyzer Tools for Vulnerability Detection\u201d, Accessed: Feb. 28, 2025. [Online]. Available: https:\/\/cwe.mitre.org"},{"key":"e_1_3_3_1_12_2","volume-title":"Guidelines for performing Systematic Literature Reviews in Software Engineering","author":"Kitchenham B.","year":"2007","unstructured":"[12] B. Kitchenham, \u201cGuidelines for performing Systematic Literature Reviews in Software Engineering,\u201d 2007. [Online]. Available: https:\/\/www.researchgate.net\/publication\/302924724"}],"event":{"name":"EASE Companion '25: Evaluation and Assessment in Software Engineering","location":"Istanbul Turkiye","acronym":"EASE Companion '25"},"container-title":["Proceedings of the 2025 29th International Conference on Evaluation and Assessment in Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727967.3756838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T12:07:15Z","timestamp":1766491635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727967.3756838"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":12,"alternative-id":["10.1145\/3727967.3756838","10.1145\/3727967"],"URL":"https:\/\/doi.org\/10.1145\/3727967.3756838","relation":{},"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"2025-12-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}