{"id":"https://openalex.org/W2745085225","doi":"https://doi.org/10.1145/3092703.3098240","title":"Inferring page models for web application analysis","display_name":"Inferring page models for web application analysis","publication_year":2017,"publication_date":"2017-07-10","ids":{"openalex":"https://openalex.org/W2745085225","doi":"https://doi.org/10.1145/3092703.3098240","mag":"2745085225"},"language":"en","primary_location":{"id":"doi:10.1145/3092703.3098240","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3092703.3098240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://mpra.ub.uni-muenchen.de/73477/1/MPRA_paper_73477.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039276951","display_name":"Snigdha Athaiya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Snigdha Athaiya","raw_affiliation_strings":["IISc Bangalore, India"],"affiliations":[{"raw_affiliation_string":"IISc Bangalore, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5039276951"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.0101,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83248881,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"412","last_page":"415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7283709049224854},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.44871312379837036},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4167901575565338},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32333171367645264}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7283709049224854},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.44871312379837036},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4167901575565338},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32333171367645264}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3092703.3098240","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3092703.3098240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai::73477","is_oa":true,"landing_page_url":null,"pdf_url":"https://mpra.ub.uni-muenchen.de/73477/1/MPRA_paper_73477.pdf","source":{"id":"https://openalex.org/S4306401429","display_name":"ePrints@IISc (Indian Institute of Science)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I59270414","host_organization_name":"Indian Institute of Science Bangalore","host_organization_lineage":["https://openalex.org/I59270414"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":{"id":"pmh:oai::73477","is_oa":true,"landing_page_url":null,"pdf_url":"https://mpra.ub.uni-muenchen.de/73477/1/MPRA_paper_73477.pdf","source":{"id":"https://openalex.org/S4306401429","display_name":"ePrints@IISc (Indian Institute of Science)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I59270414","host_organization_name":"Indian Institute of Science Bangalore","host_organization_lineage":["https://openalex.org/I59270414"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2745085225.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W202191487","https://openalex.org/W1563770249","https://openalex.org/W1965995882","https://openalex.org/W1966862293","https://openalex.org/W1981801194","https://openalex.org/W1988865334","https://openalex.org/W1989147905","https://openalex.org/W1992105245","https://openalex.org/W2011539648","https://openalex.org/W2036896594","https://openalex.org/W2043813390","https://openalex.org/W2061328386","https://openalex.org/W2075573771","https://openalex.org/W2098549348","https://openalex.org/W2106945798","https://openalex.org/W2118529754","https://openalex.org/W2125000816","https://openalex.org/W2136579066","https://openalex.org/W2140990342","https://openalex.org/W2152225177","https://openalex.org/W2247976907","https://openalex.org/W2546660241","https://openalex.org/W2646621319","https://openalex.org/W2734660483"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Web":[0],"applications":[1],"are":[2,26,44],"difficult":[3],"to":[4,103,123],"analyze":[5],"using":[6,125],"code-based":[7,127],"tools":[8],"because":[9],"data-flow":[10],"and":[11,21,100],"control-flow":[12],"through":[13],"the":[14,37,42,48,79,83,89,93,98,112],"application":[15],"occurs":[16],"via":[17],"both":[18],"server-side":[19,39,84,107],"code":[20,76,108],"client-side":[22],"pages.":[23],"Client-side":[24],"pages":[25,43],"typically":[27],"specified":[28],"in":[29,67,78,109],"a":[30,56,62,68,75,117],"scripting":[31],"language":[32,81],"that":[33,59],"is":[34,74],"different":[35],"from":[36,47],"main":[38],"language;":[40],"moreover,":[41],"generated":[45],"dynamically":[46],"scripts.":[49],"To":[50],"address":[51],"these":[52,104],"issues":[53],"we":[54],"propose":[55],"static-analysis":[57],"approach":[58],"automatically":[60],"constructs":[61],"\"model\"":[63],"of":[64,92],"each":[65],"page":[66,72,94,113],"given":[69],"application.":[70],"A":[71],"model":[73],"fragment":[77],"same":[80],"as":[82,95,97],"code,":[85],"which":[86],"faithfully":[87],"over-approximates":[88],"possible":[90],"elements":[91],"well":[96],"control-flows":[99],"data-flows":[101],"due":[102],"elements.":[105],"The":[106],"conjunction":[110],"with":[111],"models":[114],"then":[115],"becomes":[116],"standard":[118,126],"(non-web)":[119],"program,":[120],"thus":[121],"amenable":[122],"analysis":[124],"tools.":[128]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
