{"id":"https://openalex.org/W2069228726","doi":"https://doi.org/10.1145/1082983.1083216","title":"Using dynamic information flow analysis to detect attacks against applications","display_name":"Using dynamic information flow analysis to detect attacks against applications","publication_year":2005,"publication_date":"2005-05-15","ids":{"openalex":"https://openalex.org/W2069228726","doi":"https://doi.org/10.1145/1082983.1083216","mag":"2069228726"},"language":"en","primary_location":{"id":"doi:10.1145/1082983.1083216","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1082983.1083216","pdf_url":null,"source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031393207","display_name":"Wes Masri","orcid":"https://orcid.org/0000-0002-5295-4434"},"institutions":[{"id":"https://openalex.org/I98635879","display_name":"American University of Beirut","ror":"https://ror.org/04pznsd21","country_code":"LB","type":"education","lineage":["https://openalex.org/I98635879"]}],"countries":["LB"],"is_corresponding":true,"raw_author_name":"Wes Masri","raw_affiliation_strings":["American University of Beirut, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"American University of Beirut, Beirut, Lebanon","institution_ids":["https://openalex.org/I98635879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060574497","display_name":"Andy Podgurski","orcid":null},"institutions":[{"id":"https://openalex.org/I58956616","display_name":"Case Western Reserve University","ror":"https://ror.org/051fd9666","country_code":"US","type":"education","lineage":["https://openalex.org/I58956616"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andy Podgurski","raw_affiliation_strings":["Case Western Reserve University, Cleveland, OH"],"affiliations":[{"raw_affiliation_string":"Case Western Reserve University, Cleveland, OH","institution_ids":["https://openalex.org/I58956616"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031393207"],"corresponding_institution_ids":["https://openalex.org/I98635879"],"apc_list":null,"apc_paid":null,"fwci":6.8504,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.96665501,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"30","issue":"4","first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8240180015563965},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.6461563110351562},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6393581032752991},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6182264089584351},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5414682626724243},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5377801656723022},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5097696185112},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.49564969539642334},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4882378876209259},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45968931913375854},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42716825008392334},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36663758754730225},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3105085492134094},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2120533585548401}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8240180015563965},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.6461563110351562},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6393581032752991},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6182264089584351},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5414682626724243},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5377801656723022},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5097696185112},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.49564969539642334},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4882378876209259},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45968931913375854},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42716825008392334},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36663758754730225},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3105085492134094},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2120533585548401},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1082983.1083216","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1082983.1083216","pdf_url":null,"source":{"id":"https://openalex.org/S186921487","display_name":"ACM SIGSOFT Software Engineering Notes","issn_l":"0163-5948","issn":["0163-5948","1943-5843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGSOFT Software Engineering Notes","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.76.2397","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.2397","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www-lb.cs.aub.edu.lb/wm13/publications/SESS2005.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W34732858","https://openalex.org/W55907213","https://openalex.org/W85453169","https://openalex.org/W1559680178","https://openalex.org/W1584150393","https://openalex.org/W1592090113","https://openalex.org/W1975008050","https://openalex.org/W1997163656","https://openalex.org/W2029030698","https://openalex.org/W2060389212","https://openalex.org/W2094873755","https://openalex.org/W2099137371","https://openalex.org/W2100888251","https://openalex.org/W2115166460","https://openalex.org/W2122049982","https://openalex.org/W2128217000","https://openalex.org/W2129278597","https://openalex.org/W2135143063","https://openalex.org/W2135988257","https://openalex.org/W2144344516","https://openalex.org/W2150847526","https://openalex.org/W2156618683","https://openalex.org/W2167332015","https://openalex.org/W2288766236","https://openalex.org/W2542825173"],"related_works":["https://openalex.org/W4388483122","https://openalex.org/W4387126921","https://openalex.org/W3030592833","https://openalex.org/W2354385412","https://openalex.org/W2032897247","https://openalex.org/W4297908618","https://openalex.org/W4245904369","https://openalex.org/W2765641823","https://openalex.org/W4386447154","https://openalex.org/W1608166398"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,34,41],"new":[4],"approach":[5,19,55,75,89],"to":[6,12,23,29,92],"using":[7],"dynamic":[8],"information":[9,36,43,66],"flow":[10,37,44],"analysis":[11],"detect":[13],"attacks":[14,31,60],"against":[15],"application":[16],"software.":[17],"The":[18],"can":[20,56],"be":[21],"used":[22,47],"reveal":[24,58],"and,":[25],"under":[26],"some":[27],"conditions,":[28],"prevent":[30],"that":[32,61],"violate":[33],"specified":[35],"policy":[38],"or":[39],"exhibit":[40,62],"known":[42],"signature.":[45],"When":[46],"in":[48,86],"conjunction":[49],"with":[50],"automatic":[51],"cluster":[52],"analysis,":[53],"the":[54,74],"also":[57],"novel":[59],"unusual":[63],"patterns":[64],"of":[65,70],"flows.":[67],"A":[68],"set":[69],"prototype":[71],"tools":[72],"implementing":[73],"have":[76],"been":[77],"developed":[78],"for":[79],"Java":[80],"byte":[81],"code":[82],"programs.":[83],"Case":[84],"studies":[85],"which":[87],"this":[88],"was":[90],"applied":[91],"several":[93],"subject":[94],"programs":[95],"are":[96],"described.":[97]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
