{"id":"https://openalex.org/W4321606901","doi":"https://doi.org/10.1109/comsnets56262.2023.10041289","title":"Clarity: Analysing Security in Web Applications","display_name":"Clarity: Analysing Security in Web Applications","publication_year":2023,"publication_date":"2023-01-03","ids":{"openalex":"https://openalex.org/W4321606901","doi":"https://doi.org/10.1109/comsnets56262.2023.10041289"},"language":"en","primary_location":{"id":"doi:10.1109/comsnets56262.2023.10041289","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/comsnets56262.2023.10041289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019654900","display_name":"Connor J. Potter","orcid":null},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Connor J. Potter","raw_affiliation_strings":["School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011086368","display_name":"Neetesh Saxena","orcid":"https://orcid.org/0000-0002-6437-0807"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Neetesh Saxena","raw_affiliation_strings":["School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom"],"affiliations":[{"raw_affiliation_string":"School of Computer Science &#x0026; Informatics, Cardiff University,Cardiff,United Kingdom","institution_ids":["https://openalex.org/I79510175"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010792506","display_name":"Soumyadev Maity","orcid":"https://orcid.org/0000-0003-1462-7608"},"institutions":[{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Soumyadev Maity","raw_affiliation_strings":["IIIT Allahabad,Department of Information technology,Prayagraj,India","Department of Information technology, IIIT Allahabad, Prayagraj, India"],"affiliations":[{"raw_affiliation_string":"IIIT Allahabad,Department of Information technology,Prayagraj,India","institution_ids":["https://openalex.org/I26072440"]},{"raw_affiliation_string":"Department of Information technology, IIIT Allahabad, Prayagraj, India","institution_ids":["https://openalex.org/I26072440"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019654900"],"corresponding_institution_ids":["https://openalex.org/I79510175"],"apc_list":null,"apc_paid":null,"fwci":0.9163,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76819563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"522","last_page":"528"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.8795834183692932},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7407514452934265},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.7404224276542664},{"id":"https://openalex.org/keywords/cross-site-scripting","display_name":"Cross-site scripting","score":0.6799256801605225},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.6567582488059998},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.655102014541626},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.6036884188652039},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.6022765636444092},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.5307276844978333},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5220139622688293},{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5182837843894958},{"id":"https://openalex.org/keywords/dynamic-web-page","display_name":"Dynamic web page","score":0.467481791973114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4412024915218353},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.426896870136261},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.3798208236694336},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.34682342410087585},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.30703186988830566},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08654668927192688}],"concepts":[{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.8795834183692932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7407514452934265},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.7404224276542664},{"id":"https://openalex.org/C39569185","wikidata":"https://www.wikidata.org/wiki/Q371199","display_name":"Cross-site scripting","level":5,"score":0.6799256801605225},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.6567582488059998},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.655102014541626},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.6036884188652039},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.6022765636444092},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5307276844978333},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5220139622688293},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5182837843894958},{"id":"https://openalex.org/C100158260","wikidata":"https://www.wikidata.org/wiki/Q1650567","display_name":"Dynamic web page","level":3,"score":0.467481791973114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4412024915218353},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.426896870136261},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.3798208236694336},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.34682342410087585},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.30703186988830566},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08654668927192688},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/comsnets56262.2023.10041289","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/comsnets56262.2023.10041289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)","raw_type":"proceedings-article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:155302","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1985998952","https://openalex.org/W2003115932","https://openalex.org/W2108272360","https://openalex.org/W2181283584","https://openalex.org/W2502579307","https://openalex.org/W2508461527","https://openalex.org/W2752929869","https://openalex.org/W2901837432","https://openalex.org/W2913912901","https://openalex.org/W2955182064","https://openalex.org/W2994922757","https://openalex.org/W3110488792","https://openalex.org/W3114635248","https://openalex.org/W3124662913","https://openalex.org/W3132421653","https://openalex.org/W3189611200","https://openalex.org/W6622990586","https://openalex.org/W6630065895"],"related_works":["https://openalex.org/W2167752994","https://openalex.org/W2955734438","https://openalex.org/W2775081089","https://openalex.org/W2504194819","https://openalex.org/W2407701912","https://openalex.org/W1982746004","https://openalex.org/W4256450364","https://openalex.org/W2791970934","https://openalex.org/W4245700610","https://openalex.org/W4238821156"],"abstract_inverted_index":{"The":[0,45],"rapid":[1],"rise":[2],"in":[3,9,42],"business'":[4],"moving":[5],"online":[6],"has":[7],"resulted":[8],"e-commerce":[10,69],"web":[11,43,61,70],"applications":[12,87],"becoming":[13],"increasingly":[14],"targeted":[15],"by":[16],"hackers.":[17],"This":[18],"paper":[19],"proposes":[20],"Clarity,":[21],"a":[22],"dynamic":[23],"black":[24],"box":[25],"vulnerability":[26],"scanner":[27],"capable":[28],"of":[29,51,59,84],"detecting":[30],"Cross-Site":[31],"Scripting,":[32],"SQL":[33],"Injection,":[34],"HTTP":[35],"Response":[36],"Splitting,":[37],"and":[38,53],"Session":[39,73],"Management":[40,74],"vulnerabilities":[41],"applications.":[44],"developed":[46],"tool":[47],"employs":[48],"the":[49,57,77,85],"use":[50],"Mechanize":[52],"Selenium":[54],"to":[55],"perform":[56],"majority":[58],"its":[60],"scraping":[62],"requirements.":[63],"Clarity":[64],"was":[65],"tested":[66],"against":[67],"50":[68,86],"applications,":[71],"uncovering":[72],"flaws":[75],"as":[76],"most":[78],"prevalent":[79],"vulnerability,":[80],"with":[81],"36":[82],"out":[83],"being":[88],"vulnerable.":[89]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2023-02-24T00:00:00"}
