{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T21:20:32Z","timestamp":1758662432161,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1145\/3731806.3731831","type":"proceedings-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T10:17:39Z","timestamp":1758622659000},"page":"90-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bridging the Security Gap: An Empirical Analysis of LLM-API Integration Vulnerabilities and Mitigation Strategies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8952-9782","authenticated-orcid":false,"given":"Sandro","family":"Hartenstein","sequence":"first","affiliation":[{"name":"FB2, HWR Berlin, Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"e_1_3_3_1_2_2","volume-title":"Attacks on Third-Party APIs of Large Language Models","author":"Zhao W.","year":"2024","unstructured":"W. Zhao, V. Khazanchi, H. Xing, X. He, Q. Xu, and N. D. Lane, \u201cAttacks on Third-Party APIs of Large Language Models,\u201d 2024."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3634737.3661134"},{"key":"e_1_3_3_1_4_2","volume-title":"A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems","author":"Wu F.","year":"2024","unstructured":"F. Wu, N. Zhang, S. Jha, P. McDaniel, and C. Xiao, \u201cA New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems,\u201d 2024."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR61006.2024.10532874"},{"key":"e_1_3_3_1_6_2","first-page":"64","volume-title":"European Interdisciplinary Cybersecurity Conference","author":"Y\u0131ld\u0131r\u0131m R.","year":"2024","unstructured":"R. Y\u0131ld\u0131r\u0131m, K. Ayd\u0131n, and O. \u00c7etin, \u201cEvaluating the Impact of Conventional Code Analysis Against Large Language Models in API Vulnerability Detection,\u201d in European Interdisciplinary Cybersecurity Conference, Xanthi Greece, 2024, pp. 57\u201364."},{"key":"e_1_3_3_1_7_2","volume-title":"Mapping LLM Security Landscapes: A Comprehensive Stakeholder Risk Assessment Proposal","author":"Pankajakshan R.","year":"2024","unstructured":"R. Pankajakshan, S. Biswal, Y. Govindarajulu, and G. Gressel, \u201cMapping LLM Security Landscapes: A Comprehensive Stakeholder Risk Assessment Proposal,\u201d 2024."},{"key":"e_1_3_3_1_8_2","unstructured":"promptfoo LLM Evaluation 2023 ISBN: . [Online]. Available: https:\/\/www.promptfoo.dev\/."}],"event":{"name":"ICSCA 2025: 2025 14th International Conference on Software and Computer Applications","acronym":"ICSCA 2025","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2025 14th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731806.3731831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T20:54:29Z","timestamp":1758660869000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731806.3731831"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":8,"alternative-id":["10.1145\/3731806.3731831","10.1145\/3731806"],"URL":"https:\/\/doi.org\/10.1145\/3731806.3731831","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}