{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:16:41Z","timestamp":1772641001003,"version":"3.50.1"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"3","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>\n            Software developers frequently hard-code credentials such as passwords, generic secrets, private keys, and generic tokens in software repositories, even though it is strictly advised against due to the severe threat to the security of the software. These credentials create attack surfaces exploitable by a potential adversary to conduct malicious exploits, such as backdoor attacks. Recent detection efforts utilize embedding models to vectorize textual credentials before passing them to classifiers for predictions. However, these models struggle to discriminate between credentials with contextual and complex sequences resulting in high false-positive predictions. Context-dependent Pre-Trained Language Models (PLMs) or Large Language Models (LLMs) such as GPT tackled this drawback by leveraging the transformer neural architecture capacity for self-attention to capture contextual dependencies between words in input sequences. As a result, GPT has achieved wide success in several natural language understanding endeavors. Hence, we assess LLMs to represent these observations and feed extracted embedding vectors to a deep learning classifier to detect hard-coded credentials. Our model outperforms the current state of the art by 13%\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(\\in\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            F1 measure on the benchmark dataset.\n          <\/jats:p>","DOI":"10.1145\/3744756","type":"journal-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T10:00:22Z","timestamp":1751882422000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Hard-Coded Credentials in Software Repositories via LLMs"],"prefix":"10.1145","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5904-2764","authenticated-orcid":false,"given":"Chidera","family":"Biringa","sequence":"first","affiliation":[{"name":"University of Massachusetts Dartmouth, Dartmouth, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6467-1979","authenticated-orcid":false,"given":"G\u00f6khan","family":"Kul","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth, Dartmouth, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"139","volume-title":"International Workshop on Public Key Cryptography","author":"Abdalla Michel","year":"2009","unstructured":"Michel Abdalla, Xavier Boyen, C\u00e9line Chevalier, and David Pointcheval. 2009. Distributed public-key cryptography from weak secrets. In International Workshop on Public Key Cryptography. Springer, 139\u2013159."},{"key":"e_1_3_2_3_2","unstructured":"Ebtesam Almazrouei Hamza Alobeidli Abdulaziz Alshamsi Alessandro Cappelli Ruxandra Cojocaru M\u00e9rouane Debbah \u00c9tienne Goffinet Daniel Hesslow Julien Launay Quentin Malartic et al. 2023. The Falcon series of open language models. arXiv:2311.16867. Retrieved from https:\/\/arxiv.org\/abs\/2311.16867"},{"key":"e_1_3_2_4_2","first-page":"133","article-title":"The encoder-decoder framework and its applications","author":"Asadi Ahmad","year":"2020","unstructured":"Ahmad Asadi and Reza Safabakhsh. 2020. The encoder-decoder framework and its applications. In Deep Learning: Concepts and Architectures. Springer International Publishing, 133\u2013167.","journal-title":"Deep Learning: Concepts and Architectures"},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1385989.1385993","volume-title":"Proceedings of the 2nd International Conference on Distributed Event-Based Systems","author":"Bacon Jean","year":"2008","unstructured":"Jean Bacon, David M. Eyers, Jatinder Singh, and Peter R. Pietzuch. 2008. Access control in publish\/subscribe systems. In Proceedings of the 2nd International Conference on Distributed Event-Based Systems, 23\u201334."},{"key":"e_1_3_2_6_2","unstructured":"Dzmitry Bahdanau Kyunghyun Cho and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. arXiv:1409.0473. Retrieved from https:\/\/arxiv.org\/abs\/1409.0473"},{"key":"e_1_3_2_7_2","first-page":"13","article-title":"A neural probabilistic language model","author":"Bengio Yoshua","year":"2000","unstructured":"Yoshua Bengio, R\u00e9jean Ducharme, and Pascal Vincent. 2000. A neural probabilistic language model. Advances in Neural Information Processing Systems 13 (2000), 1\u20137.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Chidera Biringa Gaspard Baye and G\u00f6khan Kul. 2022. Short paper: Static and microarchitectural ML-based approaches for detecting spectre vulnerabilities and attacks. arXiv:2210.14452. Retrieved from https:\/\/arxiv.org\/abs\/2210.14452","DOI":"10.1145\/3569562.3569589"},{"issue":"2","key":"e_1_3_2_9_2","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/1150019.1136500","article-title":"A scalable architecture for high-throughput regular-expression pattern matching","volume":"34","author":"Brodie Benjamin C.","year":"2006","unstructured":"Benjamin C. Brodie, David E. Taylor, and Ron K. Cytron. 2006. A scalable architecture for high-throughput regular-expression pattern matching. ACM SIGARCH Computer Architecture News 34, 2 (2006), 191\u2013202.","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"e_1_3_2_10_2","unstructured":"Tom B. Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. arXiv:2005.14165. Retrieved from https:\/\/arxiv.org\/abs\/2005.14165"},{"key":"e_1_3_2_11_2","unstructured":"Amazon Elastic Compute Cloud. 2011. Amazon Web Services. Retrieved July 18 2025 from https:\/\/docs.aws.amazon.com\/ec2\/"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/BigDataSecurityHPSCIDS52275.2021.00038","volume-title":"2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS),","author":"D\u2019Agostino Jack","year":"2021","unstructured":"Jack D\u2019Agostino and G\u00f6khan Kul. 2021. Toward pinpointing data leakage from advanced persistent threats. In 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 157\u2013162. DOI: 10.1109\/BigDataSecurityHPSCIDS52275.2021.00038"},{"issue":"6","key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","article-title":"Indexing by latent semantic analysis","volume":"41","author":"Deerwester Scott","year":"1990","unstructured":"Scott Deerwester, Susan T. Dumais, George W. Furnas, Thomas K. Landauer, and Richard Harshman. 1990. Indexing by latent semantic analysis. Journal of the American Society for Information Science 41, 6 (1990), 391\u2013407.","journal-title":"Journal of the American Society for Information Science"},{"key":"e_1_3_2_14_2","first-page":"200","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security","author":"Delerabl\u00e9e C\u00e9cile","year":"2007","unstructured":"C\u00e9cile Delerabl\u00e9e. 2007. Identity-based broadcast encryption with constant size ciphertexts and private keys. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 200\u2013215."},{"key":"e_1_3_2_15_2","unstructured":"Jacob Devlin Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805. Retrieved from https:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TrustCom53373.2021.00103","volume-title":"2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","author":"Farinella Carlo","year":"2021","unstructured":"Carlo Farinella, Ali Ahmed, and Craig Watterson. 2021. Git leaks: Boosting detection effectiveness through endpoint visibility. In 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 701\u2013709."},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Runhan Feng Ziyang Yan Shiyan Peng and Yuanyuan Zhang. 2022. Automated detection of password leakage from public GitHub repositories. In Proceedings of the 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE) Pittsburgh PA USA 175\u2013186.","DOI":"10.1145\/3510003.3510150"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Zhangyin Feng Daya Guo Duyu Tang Nan Duan Xiaocheng Feng Ming Gong Linjun Shou Bing Qin Ting Liu Daxin Jiang et al. 2020. Codebert: A pre-trained model for programming and natural languages. arXiv:2002.08155. Retrieved from https:\/\/arxiv.org\/abs\/2002.08155","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"e_1_3_2_19_2","first-page":"1","volume-title":"2022 International Joint Conference on Neural Networks (IJCNN)","author":"Hanif Hazim","year":"2022","unstructured":"Hazim Hanif and Sergio Maffeis. 2022. Vulberta: Simplified source code pre-training for vulnerability detection. In 2022 International Joint Conference on Neural Networks (IJCNN). IEEE, 1\u20138."},{"issue":"8","key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural Computation 9, 8 (1997), 1735\u20131780.","journal-title":"Neural Computation"},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48157-5_22","volume-title":"International Symposium on Handheld and Ubiquitous Computing","author":"Holmquist Lars Erik","year":"1999","unstructured":"Lars Erik Holmquist, Johan Redstr\u00f6m, and Peter Ljungstrand. 1999. Token-based access to digital information. In International Symposium on Handheld and Ubiquitous Computing. Springer, 234\u2013245."},{"issue":"3","key":"e_1_3_2_22_2","first-page":"102","article-title":"Online map application development using google maps API, SQL database, and ASP.NET","volume":"3","author":"Hu Shunfu","year":"2013","unstructured":"Shunfu Hu and Ting Dai. 2013. Online map application development using google maps API, SQL database, and ASP.NET. International Journal of Information and Communication Technology Research 3, 3 (2013), 102\u2013110.","journal-title":"International Journal of Information and Communication Technology Research"},{"key":"e_1_3_2_23_2","author":"Jones Michael","year":"2015","unstructured":"Michael Jones, John Bradley, and Nat Sakimura. 2015. Json Web Token (jwt). Technical Report.","journal-title":"Json Web Token (jwt)"},{"key":"e_1_3_2_24_2","first-page":"572","volume-title":"7th International Conference on Information Systems Security and Privacy (ICISSP)","author":"Kall Sabrina","year":"2021","unstructured":"Sabrina Kall and Slim Trabelsi. 2021. An asynchronous federated learning approach for a security source code scanner. In 7th International Conference on Information Systems Security and Privacy (ICISSP), 572\u2013579."},{"key":"e_1_3_2_25_2","unstructured":"Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv:1412.6980. Retrieved from https:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Taku Kudo. 2018. Subword regularization: Improving neural network translation models with multiple subword candidates. arXiv:1804.10959. Retrieved from https:\/\/arxiv.org\/abs\/1804.10959","DOI":"10.18653\/v1\/P18-1007"},{"key":"e_1_3_2_27_2","first-page":"145","volume-title":"7th International Conference on Information Systems Security and Privacy (ICISSP)","author":"Lounici Sofiane","year":"2021","unstructured":"Sofiane Lounici, Marco Rosa, Carlo Maria Negri, Slim Trabelsi, and Melek \u00d6nen. 2021. Optimizing leak detection in open-source platforms with machine learning techniques. In 7th International Conference on Information Systems Security and Privacy (ICISSP), 145\u2013159."},{"key":"e_1_3_2_28_2","first-page":"1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Meli Michael","year":"2019","unstructured":"Michael Meli, Matthew R. McNiece, and Bradley Reaves. 2019. How bad can it git? Characterizing secret leakage in public GitHub repositories. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 1\u201315."},{"key":"e_1_3_2_29_2","first-page":"1","article-title":"Distributed representations of words and phrases and their compositionality","volume":"26","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. Advances in Neural Information Processing Systems 26 (2013), 1\u20139.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_30_2","first-page":"746","volume-title":"Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Mikolov Tom\u00e1\u0161","year":"2013","unstructured":"Tom\u00e1\u0161 Mikolov, Wen-Tau Yih, and Geoffrey Zweig. 2013. Linguistic regularities in continuous space word representations. In Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 746\u2013751."},{"key":"e_1_3_2_31_2","unstructured":"MITRE. 2023. 2023 CWE Top 25 Most Dangerous Software Weaknesses. Retrieved February 15 2024 from https:\/\/cwe.mitre.org\/top25\/archive\/2023\/2023_top25_list.html"},{"key":"e_1_3_2_32_2","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/1966913.1966953","volume-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","author":"Molloy Ian","year":"2011","unstructured":"Ian Molloy and Ninghui Li. 2011. Attack on the gridcode one-time password. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 306\u2013315."},{"issue":"4","key":"e_1_3_2_33_2","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1111\/j.1469-185X.2007.00027.x","article-title":"Effect size, confidence interval and statistical significance: A practical guide for biologists","volume":"82","author":"Nakagawa Shinichi","year":"2007","unstructured":"Shinichi Nakagawa and Innes C. Cuthill. 2007. Effect size, confidence interval and statistical significance: A practical guide for biologists. Biological Reviews of the Cambridge Philosophical Society 82, 4 (2007), 591\u2013605.","journal-title":"Biological Reviews of the Cambridge Philosophical Society"},{"key":"e_1_3_2_34_2","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.3115\/v1\/D14-1162","volume-title":"Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP)","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. Glove: Global vectors for word representation. In Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), 1532\u20131543."},{"issue":"8","key":"e_1_3_2_35_2","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford Alec","year":"2019","unstructured":"Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, Ilya Sutskever. 2019. Language models are unsupervised multitask learners. OpenAI Blog 1, 8 (2019), 9.","journal-title":"OpenAI Blog"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Javier Rando Fernando Perez-Cruz and Briland Hitaj. 2023. PassGPT: Password modeling and (guided) generation with large language models. arXiv:2306.01545. Retrieved from https:\/\/arxiv.org\/abs\/2306.01545","DOI":"10.1007\/978-3-031-51482-1_9"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/978-3-540-25937-4_22","volume-title":"International Workshop on Fast Software Encryption","author":"Rogaway Phillip","year":"2004","unstructured":"Phillip Rogaway. 2004. Nonce-based symmetric encryption. In International Workshop on Fast Software Encryption. Springer, 348\u2013358."},{"issue":"6","key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1037\/h0042519","article-title":"The perceptron: A probabilistic model for information storage and organization in the bra","volume":"65","author":"Rosenblatt Frank","year":"1958","unstructured":"Frank Rosenblatt. 1958. The perceptron: A probabilistic model for information storage and organization in the bra. Psychological Review 65, 6 (1958), 386\u2013408.","journal-title":"Psychological Review"},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/COMSNETS48256.2020.9027350","volume-title":"2020 International Conference on COMmunication Systems and NETworkS (COMSNETS)","author":"Saha Aakanksha","year":"2020","unstructured":"Aakanksha Saha, Tamara Denning, Vivek Srikumar, and Sneha Kumar Kasera. 2020. Secrets in source code: Reducing false positives using machine learning. In 2020 International Conference on COMmunication Systems and NETworkS (COMSNETS). IEEE, 168\u2013175."},{"key":"e_1_3_2_40_2","first-page":"112","volume-title":"Procedia Computer Science","author":"Mohd Saleh Ain Zubaidah","year":"2015","unstructured":"Ain Zubaidah Mohd Saleh, Nur Amizah Rozali, Alya Geogiana Buja, Kamarularifin Abd Jalil, Fakariah Hani Mohd Ali, and Teh Faradilla Abdul Rahman. 2015. A method for web application vulnerabilities detection by using Boyer-Moore string matching algorithm. Procedia Computer Science 72 (2015), 112\u2013121."},{"key":"e_1_3_2_41_2","unstructured":"Samsung. 2022. CredSweeper. Retrieved October 30 2022 from https:\/\/github.com\/Samsung\/CredSweeper"},{"key":"e_1_3_2_42_2","first-page":"851","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security","author":"Schuster Felix","year":"2013","unstructured":"Felix Schuster and Thorsten Holz. 2013. Towards reducing the attack surface of software backdoors. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 851\u2013862."},{"key":"e_1_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Rico Sennrich Barry Haddow and Alexandra Birch. 2015. Neural machine translation of rare words with subword units. arXiv:1508.07909. Retrieved from https:\/\/arxiv.org\/abs\/1508.07909","DOI":"10.18653\/v1\/P16-1162"},{"key":"e_1_3_2_44_2","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/MSR.2015.48","volume-title":"2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories","author":"Sinha Vibha Singhal","year":"2015","unstructured":"Vibha Singhal Sinha, Diptikalyan Saha, Pankaj Dhoolia, Rohan Padhye, and Senthil Mani. 2015. Detecting and mitigating secret-key leaks in source code repositories. In 2015 IEEE\/ACM 12th Working Conference on Mining Software Repositories. IEEE, 396\u2013400."},{"key":"e_1_3_2_45_2","first-page":"1","volume-title":"In 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT)","author":"Islam Tatli Emin","year":"2018","unstructured":"Emin Islam Tatli and Ensar Seker. 2018. Password replacement patterns. In 2018 5th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE, 1\u20135."},{"key":"e_1_3_2_46_2","unstructured":"Hugo Touvron Thibaut Lavril Gautier Izacard Xavier Martinet Marie-Anne Lachaux Timoth\u00e9e Lacroix Baptiste Rozi\u00e8re Naman Goyal Eric Hambro Faisal Azhar et al. 2023. LLaMA: Open and efficient foundation language models. arXiv:2302.13971. Retrieved from https:\/\/arxiv.org\/abs\/2302.13971"},{"issue":"11","key":"e_1_3_2_47_2","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Van der Maaten Laurens","year":"2008","unstructured":"Laurens Van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of Machine Learning Research 9, 11 (2008), 2579\u20132605.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_48_2","first-page":"1","article-title":"Attention is all you need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017), 1\u201311.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_49_2","first-page":"123","volume-title":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","author":"Wen Elliott","year":"2022","unstructured":"Elliott Wen, Jia Wang, and Jens Dietrich. 2022. Secrethunter: A large-scale secret scanner for public git repositories. In 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 123\u2013130."},{"key":"e_1_3_2_50_2","article-title":"Uber concealed massive hack that exposed data of 57m users and drivers","volume":"22","author":"Wong Julia Carrie","year":"2017","unstructured":"Julia Carrie Wong. 2017. Uber concealed massive hack that exposed data of 57m users and drivers. The Guardian 22 (2017). Retrieved from https:\/\/www.theguardian.com\/technology\/2017\/nov\/21\/uber-data-hack-cyber-attack","journal-title":"The Guardian"},{"key":"e_1_3_2_51_2","unstructured":"JaeKu Yun ShinHyung Choi YuJeong Lee Oleksandra Sokol WooChul Shim Arkadiy Melkonyan and Dmytro Kuzmenko. 2021. Project CredData: A Dataset of Credentials for Research. Retrieved from https:\/\/github.com\/Samsung\/CredData"}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3744756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T07:36:48Z","timestamp":1757662608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3744756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3744756"],"URL":"https:\/\/doi.org\/10.1145\/3744756","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"value":"2692-1626","type":"print"},{"value":"2576-5337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"2024-07-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}