{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T03:16:55Z","timestamp":1773371815085,"version":"3.50.1"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"ISSTA","funder":[{"name":"NSFC Program","award":["No. U2441238, 62021002"],"award-info":[{"award-number":["No. U2441238, 62021002"]}]},{"name":"National Key Research and Development Project","award":["No. 2022YFB3104000"],"award-info":[{"award-number":["No. 2022YFB3104000"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Softw. Eng."],"published-print":{"date-parts":[[2025,6,22]]},"abstract":"<jats:p>The ransomware threat to the software ecosystem has grown rapidly in recent years. Despite being well-studied, new ransomware variants continually emerge, designed to evade existing encryption-based detection mechanisms. This paper introduces Remembrall, a new perspective to defend against ransomware by monitoring and preventing system backup disruptions. Focusing on deletion actions of volume shadow copies (VSC) in Windows, Remembrall captures related malicious events and identifies all ransomware traces as a real-time defense tool. To ensure no ransomware is missing, we conduct a comprehensive investigation to classify all potential attack actions that can be used to delete VSCs throughout the application layer, OS layer, and hardware layer. Based on the analysis, Remembrall is designed to retrieve system event information and accurately identify ransomware without false negatives. We evaluate Remembrall on recent ransomware samples. Remembrall achieves 4.31%-87.55% increase in F1-score compared to other state-of-the-art anti-ransomware tools across 60 ransomware families. Remembrall has also detected eight zero-day ransomware samples in the experiment.<\/jats:p>","DOI":"10.1145\/3728880","type":"journal-article","created":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T10:52:56Z","timestamp":1750589576000},"page":"229-249","source":"Crossref","is-referenced-by-count":1,"title":["Preventing Disruption of System Backup against Ransomware Attacks"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-5808-9553","authenticated-orcid":false,"given":"Yiwei","family":"Hou","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4336-7190","authenticated-orcid":false,"given":"Lihua","family":"Guo","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6446-247X","authenticated-orcid":false,"given":"Chijin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7778-4243","authenticated-orcid":false,"given":"Quan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0450-3591","authenticated-orcid":false,"given":"Wenhuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"},{"name":"UnionTech, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-2491","authenticated-orcid":false,"given":"Chengnian","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0955-503X","authenticated-orcid":false,"given":"Yu","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,22]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"https:\/\/bazaar.abuse.ch\/browse\/ (Online","year":"2024","unstructured":"2024. Bazaar. https:\/\/bazaar.abuse.ch\/browse\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_2_1","volume-title":"tutorialjinni. https:\/\/www.tutorialjinni.com\/download-free-malware-samples.htm (Online","year":"2024","unstructured":"2024. tutorialjinni. https:\/\/www.tutorialjinni.com\/download-free-malware-samples.htm (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_3_1","volume-title":"https:\/\/www.virustotal.com\/gui\/contact-us\/premium-services (Online","year":"2024","unstructured":"2024. VirusTotal. https:\/\/www.virustotal.com\/gui\/contact-us\/premium-services (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_4_1","volume-title":"ESORICS 2021: 26th European Symposium on Research in Computer Security. 240\u2013260","author":"Ahmed Muhammad Ejaz","year":"2021","unstructured":"Muhammad Ejaz Ahmed, Hyoungshick Kim, Seyit Camtepe, and Surya Nepal. 2021. Peeler: Profiling kernel-level events to detect ransomware. In ESORICS 2021: 26th European Symposium on Research in Computer Security. 240\u2013260."},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","article-title":"Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions","volume":"74","author":"Saleh Al-Rimy Bander Ali","year":"2018","unstructured":"Bander Ali Saleh Al-Rimy, Mohd Aizaini Maarof, and Syed Zainudeen Mohd Shaid. 2018. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. Computers & Security, 74 (2018), 144\u2013166.","journal-title":"Computers & Security"},{"key":"e_1_2_1_6_1","volume-title":"30th USENIX Security Symposium. 3505\u20133522","author":"Alrawi Omar","year":"2021","unstructured":"Omar Alrawi, Charles Lever, Kevin Valakuzhy, Kevin Snow, Fabian Monrose, and Manos Antonakakis. 2021. The Circle of life: A large-scale study of the IoT malware lifecycle. In 30th USENIX Security Symposium. 3505\u20133522."},{"key":"e_1_2_1_7_1","volume-title":"30th USENIX Security Symposium. 3487\u20133504","author":"Avllazagaj Erin","year":"2021","unstructured":"Erin Avllazagaj, Ziyun Zhu, Leyla Bilge, Davide Balzarotti, and Tudor Dumitra\u0219. 2021. When malware changed its mind: An empirical study of variable program behaviors in the real world. In 30th USENIX Security Symposium. 3487\u20133504."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103349"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118299"},{"key":"e_1_2_1_10_1","volume-title":"Ransomware Payments Exceed $1 Billion","year":"2023","unstructured":"Chainalysis. 2024. Ransomware Payments Exceed $1 Billion in 2023, Hitting Record High After 2022 Decline.. https:\/\/www.chainalysis.com\/blog\/ransomware-2024\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_11_1","first-page":"1239","article-title":"Analysis of encryption key generation in modern crypto ransomware","volume":"19","author":"Cicala Fabrizio","year":"2020","unstructured":"Fabrizio Cicala and Elisa Bertino. 2020. Analysis of encryption key generation in modern crypto ransomware. IEEE Transactions on Dependable and Secure Computing, 19, 2 (2020), 1239\u20131253.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991110"},{"key":"e_1_2_1_13_1","volume-title":"Windows security: Defender, antivirus and more for windows 11.. https:\/\/www.microsoft.com\/en-us\/windows\/comprehensive-security (Online","author":"Defender Windows","year":"2024","unstructured":"Windows Defender. 2024. Windows security: Defender, antivirus and more for windows 11.. https:\/\/www.microsoft.com\/en-us\/windows\/comprehensive-security (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_14_1","volume-title":"Department of Justice Disrupts Hive Ransomware Variant.. https:\/\/www.justice.gov\/opa\/pr\/us-department-justice-disrupts-hive-ransomware-variant (Online","author":"J.","year":"2024","unstructured":"DoJ. 2023. U.S. Department of Justice Disrupts Hive Ransomware Variant.. https:\/\/www.justice.gov\/opa\/pr\/us-department-justice-disrupts-hive-ransomware-variant (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_15_1","volume-title":"Disrupt LockBit Ransomware Variant.. https:\/\/www.justice.gov\/opa\/pr\/us-and-uk-disrupt-lockbit-ransomware-variant (Online","author":"J.","year":"2024","unstructured":"DoJ. 2024. U.S. and U.K. Disrupt LockBit Ransomware Variant.. https:\/\/www.justice.gov\/opa\/pr\/us-and-uk-disrupt-lockbit-ransomware-variant (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_16_1","volume-title":"Cyber Attack Suspected in German Woman\u2019s Death.. https:\/\/www.nytimes.com\/2020\/09\/18\/world\/europe\/cyber-attack-germany-ransomeware-death.html (Online","author":"Eddy Melissa","year":"2024","unstructured":"Melissa Eddy and Nicole Perlroth. 2020. Cyber Attack Suspected in German Woman\u2019s Death.. https:\/\/www.nytimes.com\/2020\/09\/18\/world\/europe\/cyber-attack-germany-ransomeware-death.html (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3214781"},{"key":"e_1_2_1_18_1","volume-title":"https:\/\/eraser.heidi.ie\/ (Online","year":"2024","unstructured":"Eraser. 2024. Eraser.. https:\/\/eraser.heidi.ie\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_19_1","first-page":"600","article-title":"Deepware: Imaging performance counters with deep learning to detect ransomware","volume":"72","author":"Ganfure Gaddisa Olani","year":"2022","unstructured":"Gaddisa Olani Ganfure, Chun-Feng Wu, Yuan-Hao Chang, and Wei-Kuan Shih. 2022. Deepware: Imaging performance counters with deep learning to detect ransomware. IEEE Trans. Comput., 72, 3 (2022), 600\u2013613.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3240025"},{"key":"e_1_2_1_21_1","volume-title":"https:\/\/www.google.com\/chrome\/ (Online","year":"2024","unstructured":"Google. 2024. Chrome.. https:\/\/www.google.com\/chrome\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_22_1","volume-title":"https:\/\/notepad-plus-plus.org\/ (Online","author":"Don Ho.","year":"2024","unstructured":"Don Ho. 2024. Notepad++.. https:\/\/notepad-plus-plus.org\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. Article 161","author":"Hou Yiwei","year":"2024","unstructured":"Yiwei Hou, Lihua Guo, Chijin Zhou, Yiwen Xu, Zijing Yin, Shanshan Li, Chengnian Sun, and Yu Jiang. 2024. An Empirical Study of Data Disruption by Ransomware Attacks. In Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. Article 161, 12 pages."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. 2231\u20132244","author":"Huang Jian","year":"2017","unstructured":"Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, and Moinuddin K Qureshi. 2017. Flashguard: Leveraging intrinsic flash properties to defend against encryption ransomware. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. 2231\u20132244."},{"key":"e_1_2_1_25_1","volume-title":"UNVEIL: A Large-Scale, automated approach to detecting ransomware. In 25th USENIX security symposium. 757\u2013772.","author":"Kharaz Amin","year":"2016","unstructured":"Amin Kharaz, Sajjad Arshad, Collin Mulliner, William Robertson, and Engin Kirda. 2016. UNVEIL: A Large-Scale, automated approach to detecting ransomware. In 25th USENIX security symposium. 757\u2013772."},{"key":"e_1_2_1_26_1","volume-title":"RAID 2017, Atlanta, GA, USA, September 18\u201320, 2017, Proceedings. 98\u2013119","author":"Kharraz Amin","year":"2017","unstructured":"Amin Kharraz and Engin Kirda. 2017. Redemption: Real-time protection against ransomware at end-hosts. In Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18\u201320, 2017, Proceedings. 98\u2013119."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053035"},{"key":"e_1_2_1_28_1","volume-title":"Kaspersky: Cybersecurity that\u2019s always a step ahead.. https:\/\/usa.kaspersky.com\/ (Online","author":"Kaspersky Lab AO","year":"2024","unstructured":"AO Kaspersky Lab. 2024. Kaspersky: Cybersecurity that\u2019s always a step ahead.. https:\/\/usa.kaspersky.com\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","first-page":"102512","DOI":"10.1016\/j.cose.2021.102512","article-title":"Rcryptect: Real-time detection of cryptographic function in the user-space filesystem","volume":"112","author":"Lee Seungkwang","year":"2022","unstructured":"Seungkwang Lee, Nam-su Jho, Doyoung Chung, Yousung Kang, and Myungchul Kim. 2022. Rcryptect: Real-time detection of cryptographic function in the user-space filesystem. Computers & Security, 112 (2022), 102512.","journal-title":"Computers & Security"},{"key":"e_1_2_1_30_1","volume-title":"https:\/\/www.diskgenius.com\/ (Online","author":"Ltd Eassos","year":"2024","unstructured":"Eassos Ltd. 2024. DiskGenius.. https:\/\/www.diskgenius.com\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_31_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Luo Liang","year":"2018","unstructured":"Liang Luo, Suman Nath, Lenin Ravindranath Sivalingam, Madan Musuvathi, and Luis Ceze. 2018. Troubleshooting $Transiently-Recurring$ Errors in Production Systems with $Blame-Proportional$ Logging. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 321\u2013334."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 341\u2013355","author":"Ma Boyang","year":"2023","unstructured":"Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, and Jianfeng Ma. 2023. Travelling the hypervisor and ssd: A tag-based approach against crypto ransomware with fine-grained data recovery. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 341\u2013355."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818039"},{"key":"e_1_2_1_34_1","volume-title":"International Symposium on Research in Attacks, Intrusions, and Defenses. 114\u2013136","author":"Mehnaz Shagufta","year":"2018","unstructured":"Shagufta Mehnaz, Anand Mudgerikar, and Elisa Bertino. 2018. Rwguard: A real-time detection system against cryptographic ransomware. In International Symposium on Research in Attacks, Intrusions, and Defenses. 114\u2013136."},{"key":"e_1_2_1_35_1","volume-title":"diskpart.. https:\/\/learn.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/diskpart (Online","year":"2024","unstructured":"Microsoft. 2024. diskpart.. https:\/\/learn.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/diskpart (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_36_1","volume-title":"https:\/\/www.microsoft.com\/en-us\/edge\/download?form=MA13FJ (Online","year":"2024","unstructured":"Microsoft. 2024. Edge.. https:\/\/www.microsoft.com\/en-us\/edge\/download?form=MA13FJ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_37_1","volume-title":"https:\/\/github.com\/microsoft\/krabsetw (Online","year":"2024","unstructured":"Microsoft. 2024. Krabsetw.. https:\/\/github.com\/microsoft\/krabsetw (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_38_1","volume-title":"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sdelete (Online","year":"2024","unstructured":"Microsoft. 2024. SDelete.. https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/sdelete (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_39_1","volume-title":"Windows Media Player.. https:\/\/support.microsoft.com\/en-us\/windows\/get-windows-media-player-81718e0d-cfce-25b1-aee3-94596b658287 (Online","year":"2024","unstructured":"Microsoft. 2024. Windows Media Player.. https:\/\/support.microsoft.com\/en-us\/windows\/get-windows-media-player-81718e0d-cfce-25b1-aee3-94596b658287 (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3099084"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514229"},{"key":"e_1_2_1_42_1","volume-title":"https:\/\/www.aescrypt.com\/ (Online","author":"Inc. Packetizer. 2024. AES Crypt..","year":"2024","unstructured":"Inc. Packetizer. 2024. AES Crypt.. https:\/\/www.aescrypt.com\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2258\u20132260","author":"Paik Joon-Young","year":"2018","unstructured":"Joon-Young Paik, Joong-Hyun Choi, Rize Jin, Jianming Wang, and Eun-Sun Cho. 2018. A storage-level detection mechanism against crypto-ransomware. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2258\u20132260."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317889"},{"key":"e_1_2_1_45_1","volume-title":"https:\/\/diskcryptor.org\/ (Online","author":"Cryptor Disk","year":"2024","unstructured":"pathtofile. 2024. Disk Cryptor.. https:\/\/diskcryptor.org\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_46_1","volume-title":"https:\/\/github.com\/pathtofile\/Sealighter (Online","year":"2024","unstructured":"pathtofile. 2024. Sealighter.. https:\/\/github.com\/pathtofile\/Sealighter (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_47_1","volume-title":"https:\/\/www.7-zip.org\/ (Online","author":"Pavlov Igor","year":"2024","unstructured":"Igor Pavlov. 2024. 7-ZIP.. https:\/\/www.7-zip.org\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_48_1","unstructured":"Nitin Pundir Mark Tehranipoor and Fahim Rahman. 2020. RanStop: A hardware-assisted runtime crypto-ransomware detection technique. arXiv preprint arXiv:2011.12248."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507773"},{"key":"e_1_2_1_50_1","volume-title":"360 Total Security: Free antivirus Protect your security and privacy.. https:\/\/www.360totalsecurity.com\/en (Online","author":"Security Total","year":"2024","unstructured":"360 Total Security. 2024. 360 Total Security: Free antivirus Protect your security and privacy.. https:\/\/www.360totalsecurity.com\/en (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101997"},{"key":"e_1_2_1_52_1","volume-title":"https:\/\/github.com\/VirusTotal\/yara (Online","year":"2024","unstructured":"VirusTotal\/Yara. 2024. Yara.. https:\/\/github.com\/VirusTotal\/yara (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation. 1\u201316","author":"Wang Zhongyu","year":"2024","unstructured":"Zhongyu Wang, Yaheng Song, Erci Xu, Haonan Wu, Guangxun Tong, Shizhuo Sun, Haoran Li, Jincheng Liu, Lijun Ding, Rong Liu, Jiaji Zhu, and Jiesheng Wu. 2024. Ransom Access Memories: Achieving Practical Ransomware Protection in Cloud with DeftPunk. In Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation. 1\u201316."},{"key":"e_1_2_1_54_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/CryptoLocker (Online","year":"2024","unstructured":"Wikipedia. 2024. CryptoLocker.. https:\/\/en.wikipedia.org\/wiki\/CryptoLocker (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_55_1","volume-title":"Time Machine (macOS).. https:\/\/en.wikipedia.org\/wiki\/Time_Machine_(macOS) (Online","year":"2024","unstructured":"Wikipedia. 2024. Time Machine (macOS).. https:\/\/en.wikipedia.org\/wiki\/Time_Machine_(macOS) (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_56_1","volume-title":"https:\/\/www.win-rar.com\/ (Online","author":"H.","year":"2024","unstructured":"win.rar GmbH. 2024. WinRAR.. https:\/\/www.win-rar.com\/ (Online; accessed on October 10, 2024)"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3200908"},{"key":"e_1_2_1_58_1","article-title":"Ranker: Early Ransomware Detection through Kernel-level Behavioral Analysis","author":"Zhang Huan","year":"2024","unstructured":"Huan Zhang, Lixin Zhao, Aimin Yu, Lijun Cai, and Dan Meng. 2024. Ranker: Early Ransomware Detection through Kernel-level Behavioral Analysis. IEEE Transactions on Information Forensics and Security.","journal-title":"IEEE Transactions on Information Forensics and Security."},{"key":"e_1_2_1_59_1","volume-title":"2023 IEEE Symposium on Security and Privacy. 2584\u20132601","author":"Zhou Chijin","year":"2023","unstructured":"Chijin Zhou, Lihua Guo, Yiwei Hou, Zhenya Ma, Quan Zhang, Mingzhe Wang, Zhe Liu, and Yu Jiang. 2023. Limits of I\/O Based Ransomware Detection: An Imitation Based Attack. In 2023 IEEE Symposium on Security and Privacy. 2584\u20132601."}],"container-title":["Proceedings of the ACM on Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3728880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T16:51:52Z","timestamp":1752684712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728880"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":59,"journal-issue":{"issue":"ISSTA","published-print":{"date-parts":[[2025,6,22]]}},"alternative-id":["10.1145\/3728880"],"URL":"https:\/\/doi.org\/10.1145\/3728880","relation":{},"ISSN":["2994-970X"],"issn-type":[{"value":"2994-970X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,22]]}}}